PRIORITY OF PROGRAM DOCUMENTS Sample Clauses

PRIORITY OF PROGRAM DOCUMENTS. 4.1 Program Documents The terms of this Agreement and the terms of the other Program Documents are intended by the Parties, and shall be interpreted, to be complementary. In the event of any conflict between the terms of this Agreement and the Habitat Conservation Plan (HCP), Biological Assessment (BA), or Environmental Impact Statement/Environmental Impact Report (EIS/EIR), the terms of this Agreement will control. In the event of a conflict between the Implementing Agreement (IA) and this Agreement, the terms of this Agreement will control.
AutoNDA by SimpleDocs
PRIORITY OF PROGRAM DOCUMENTS 

Related to PRIORITY OF PROGRAM DOCUMENTS

  • Priority of Agreements This DPA shall govern the treatment of Student Data in order to comply with the privacy protections, including those found in FERPA and all applicable privacy statutes identified in this DPA. In the event there is conflict between the terms of the DPA and the Service Agreement, Terms of Service, Privacy Policies, or with any other bid/RFP, license agreement, or writing, the terms of this DPA shall apply and take precedence. In the event of a conflict between Exhibit H, the SDPC Standard Clauses, and/or the Supplemental State Terms, Exhibit H will control, followed by the Supplemental State Terms. Except as described in this paragraph herein, all other provisions of the Service Agreement shall remain in effect.

  • Priority of agreements and errors discrepancies

  • Priority of Documents The documents forming the Contract are to be taken as mutually explanatory of one another. For the purposes of interpretation, the priority of the documents shall be in accordance with the following sequence:

  • Agreement Documents 1. This Agreement consists of the following documents:

  • Procurement Documents Languages in which the procurement documents are officially available: ENG Languages in which the procurement documents (or their parts) are unofficially available: ENG Address of the procurement documents: xxxxx://xxx.xxxxxxxx.xxx.xx/xxxx/cft/xxxxXxxxxxxxXxxxxxxxx.xx? resourceId=3158945,

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

Time is Money Join Law Insider Premium to draft better contracts faster.