Perimeter Sediment Controls Sample Clauses

Perimeter Sediment Controls. Perimeter protection to filter sediment from sheet flow shall be provided downstream of all disturbed areas. Perimeter protection may include preserving vegetated strips as well as more conventional constructed measures such as sediment fences, straw xxxxx, and bio-filter bags (refer to the ODOT Hydraulics Manual BMPs and implementation measures from Section 280 of the Oregon Standard Specifications for Construction). Such protection shall be installed prior to upslope grading.
AutoNDA by SimpleDocs

Related to Perimeter Sediment Controls

  • Erosion and Sediment Control The Contractor shall install and maintain erosion and sediment control devices to prevent adjacent streets, storm drains and property from accumulations of soil, sediment, or dust which result from his work. Devices installed to control sediment and prevent erosion shall comply with the requirements of the Georgia Tech Project Superintendent. The Contractor is responsible for monitoring downstream conditions throughout the construction period and clearing any debris, sediment, and dust caused by the progress of the Work. The Contractor shall inspect, maintain, and clear erosion and sediment control devices at least weekly unless otherwise directed by the Georgia Institute of Technology Construction Manager. At the conclusion of the Work, the Contractor shall remove all installed devices and restoring the site to the satisfaction of the Georgia Tech Construction Manager.

  • Expansive Controls Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes will not be used to circumvent normal trunk servicing. Expansive controls will only be used when mutually agreed to by the Parties.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Agreement Controls In the event that any term of any of the Loan Documents other than this Agreement conflicts with any express term of this Agreement, the terms and provisions of this Agreement shall control to the extent of such conflict.

  • Audit Controls P. Contractor agrees to an annual system security review by the County to assure that systems processing and/or storing Medi-Cal PII are secure. This includes audits and keeping records for a period of at least three (3) years. A routine procedure for system review to catch unauthorized access to Medi-Cal PII shall be established by the Contractor.

  • Personnel Controls The County Department/Agency agrees to advise County Workers who have access to Pll, of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non- compliance contained in applicable federal and state laws. For that purpose, the County Department/Agency shall implement the following personnel controls:

  • Pest Control A. Whenever a department utilizes a pest control chemical in State owned or managed buildings/grounds, the department will provide at least forty-eight (48) hours notice prior to application of the chemical, unless an infestation occurs which requires immediate action. Notices will be posted in the lobby of the building and will be disseminated to building tenant contacts.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Restrictive Controls Either Party may use protective network traffic management controls such as 7-digit and 10-digit code gaps set at appropriate levels on traffic toward each other's network, when required, to protect the public switched network from congestion due to facility failures, switch congestion, or failure or focused overload. CLEC and CenturyLink will immediately notify each other of any protective control action planned or executed.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

Time is Money Join Law Insider Premium to draft better contracts faster.