Perimeter Sediment Controls Sample Clauses

Perimeter Sediment Controls. Perimeter protection to filter sediment from sheet flow shall be provided downstream of all disturbed areas. Perimeter protection may include preserving vegetated strips as well as more conventional constructed measures such as sediment fences, straw xxxxx, and bio-filter bags (refer to the ODOT Hydraulics Manual BMPs and implementation measures from Section 280 of the Oregon Standard Specifications for Construction). Such protection shall be installed prior to upslope grading.
AutoNDA by SimpleDocs

Related to Perimeter Sediment Controls

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Agreement Controls In the event that any term of any of the Loan Documents other than this Agreement conflicts with any express term of this Agreement, the terms and provisions of this Agreement shall control to the extent of such conflict.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • TIA Controls If any provision of this Indenture limits, qualifies, or conflicts with another provision which is required to be included in this Indenture by the TIA, the required provision shall control.

  • Pest Control Upon award, the Contractor shall manage all insect, weed and pest problems (as defined by Chapter 482, F.S.). In addition, any damage caused by pests during the implementation of the pest control program shall be immediately corrected by replacement with healthy turf or plants at the Contractor's expense. Pest Control program shall include, at a minimum, the following: 1) The Contractor shall inspect the entire property, including turf areas, shrubs, trees (including palms), and plants on a weekly basis for any pest infestation. All infestations, including disease, weeds, fire ants or other pests, shall be treated immediately upon discovery and notification by Performance Administrator or the Contractor. The County Performance Administrator must be informed of infestations discovered and treatments applied via email within 24 hours and included on the Monthly Vendor Inspection Report. All applications of pesticides shall be properly labeled by placards. 2) Application must comply with manufacturer’s recommendations. Every chemical substance used must be on the list of chemical substances or have been submitted for inclusion on such list, as compiled by the Environmental Protection Agency (EPA) pursuant to the Toxic Substances Control Act and in compliance with all Federal, State, and local pesticide laws and ordinances. Materials and application shall meet all Federal Health and Safety Laws currently in effect. Safety Data Sheets (SDS) must be submitted in writing two (2) days prior to contract start date or before the use of a new approved chemical intended for use on this contract. All chemicals used must carry an EPA approved number. 3) Pest Control Services shall be performed according to Integrated Pest Management Strategies to control all insect, wee, and pest problems as defined by all sections under Chapter 482, Florida Statues including proper licensure whether by the Contractor or a sub- contractor to be supplied with pre-bid package.

  • Books and Records; Internal Accounting Controls The records and documents of the Company and its Subsidiaries accurately reflect in all material respects the information relating to the business of the Company and the Subsidiaries, the location and collection of their assets, and the nature of all transactions giving rise to the obligations or accounts receivable of the Company or any Subsidiary. The Company and each of its Subsidiaries maintain a system of internal accounting controls sufficient, in the judgment of the Company's board of directors, to provide reasonable assurance that (i) transactions are executed in accordance with management's general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management's general or specific authorization and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate actions are taken with respect to any differences.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Plan Document Controls The rights granted under this Agreement are in all respects subject to the provisions set forth in the Plan to the same extent and with the same effect as if set forth fully in this Agreement. If the terms of this Agreement conflict with the terms of the Plan document, the Plan document will control.

  • Personal Controls a. Employee Training. All workforce members who assist in the performance of functions or activities on behalf of COUNTY in connection with Agreement, or access or disclose PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, must complete information privacy and security training, at least annually, at CONTRACTOR’s expense. Each workforce member who receives information privacy and security training must sign a certification, indicating the member’s name and the date on which the training was completed. These certifications must be retained for a period of six (6) years following the termination of Agreement.

  • Disclosure Controls The Company and its subsidiaries maintain an effective system of “disclosure controls and procedures” (as defined in Rule 13a-15(e) of the Exchange Act) that complies with the requirements of the Exchange Act and that has been designed to ensure that information required to be disclosed by the Company in reports that it files or submits under the Exchange Act is recorded, processed, summarized and reported within the time periods specified in the Commission’s rules and forms, including controls and procedures designed to ensure that such information is accumulated and communicated to the Company’s management as appropriate to allow timely decisions regarding required disclosure. The Company and its subsidiaries have carried out evaluations of the effectiveness of their disclosure controls and procedures as required by Rule 13a-15 of the Exchange Act.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!