Project Number The project number has been assigned by the Commission as the unique identifier for your project, and it cannot be changed. The project number should appear on each page of the grant agreement preparation documents to prevent errors during its handling.
Agreement Number 2652 Agreement Number: 2653 Agreement Number: 2812
Data Universal Number System (DUNS) number Requirement Grantee will provide their valid DUNS number contemporaneous with execution of this Agreement.
Contract Number All purchase orders issued by purchasing entities within the jurisdiction of this Addendum shall include the Participating State Addendum Number: 46151504-NASPO-17-ACS. This Addendum and Master Agreement number RFP-NK-15-001 (administered by the State of Colorado) together with its exhibits, set forth the entire agreement between the Parties with respect to the subject matter of all previous communications, representations or agreements, whether oral or written, with respect to the subject matter hereof. Terms and conditions inconsistent with, contrary or in addition to the terms and conditions of this Addendum and the Contract, together with its exhibits, shall not be added to or incorporated into this Addendum or the Contract and its exhibits, by any subsequent purchase order or otherwise, and any such attempts to add or incorporate such terms and conditions are hereby rejected. The terms and conditions of this Addendum and the Contract and its exhibits shall prevail and govern in the case of any such inconsistent or additional terms within the Participating State.
Private Placement Number A Private Placement Number issued by Standard & Poor’s CUSIP Service Bureau (in cooperation with the SVO) shall have been obtained for the Notes.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:
Agreement Xxx 0000 The Company shall not produce iron ore under this Agreement for transportation in any calendar year in excess of the approved production limit nor shall the total number of the mine workforce exceed the approved mine workforce without the prior consent in principle of the Minister and, subject to that consent, approval of detailed proposals in regard thereto in accordance with this Clause.
Tie Breaker The parties agree to utilize the following procedure if two or more members of the bargaining unit hold the same position within the same department and have the identical seniority dates: 1. If two or more bargaining unit members have the same amount of time in a particular classification, the first tiebreaker is the date of continuous University service. Continuous service is that service unbroken by a resignation or termination from the University. 2. In the event that a tie is not broken by the foregoing procedure, the second tiebreaker shall be the uninterrupted service of an employee with a state agency, a county office, or a state-supported college or university where no break in service occurs. 3. In the event a tie is not broken by either of the foregoing procedures, we will use the last four (4) digits of the Social Security Number, in ascending order with the lowest number prevailing (i.e. 0001, 0002, 0003, 0004 – 0001 Prevails).
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.