Priority Projects Sample Clauses

Priority Projects. 1. The “Priority Projects” listed in Appendix B attached hereto, totaling approximately $32.5 million, have been pre-approved for funding through the Trust and shall be implemented by the Trust Administrator pursuant to a schedule to be developed by the Governance Committee in order to meet the primary objectives of the Trust during its initial phase. The Governance Committee, by a three-quarters (3/4) vote, may determine, on the basis of changed circumstances, that a Priority Project should not be implemented in whole or in part.
AutoNDA by SimpleDocs
Priority Projects. Grantee must choose one or more of the following Priority Projects:
Priority Projects. The City and the MAFPE partners agree to give first priority to the following Digital Harbor redevelopment projects (see appendix for more detail): @ HarborPoint/Constellation @ Xxxxxxx-Xxxxxx Industrial area @ Aquarium/Port Xxxxxxxxx @ Waterfront Promenade/Greenway Trail System Implementation. The City and MAFPE agree to establish a Working Committee on the Digital Harbor. Future committees may be set up to address other issues of common concern with the agreement of both parties.
Priority Projects. The following energy storage projects shall have priority in the SGIP lottery process: - Energy storage projects located within the service territory of Los Angeles Department of Water and Power.11 - Energy storage projects located within the West Los Angeles Local Reliability Area of Southern California Edison’s service territory. - Energy storage systems paired with an on-site renewable generator and claiming the Investment Tax Credit (ITC) or, if not claiming the ITC, charging a minimum of 75% from the on-site renewable generator. Energy storage projects that meet more than one criterion shall be given the highest priority. A lottery will be held for the projects in the priority or non-priority category that exceeds available funding in the active step. Generation projects shall have priority in the SGIP lottery in the following order:
Priority Projects. The work under this contract previously described as Phase I and Phase I Optional Services began in April 2020, shortly after the onset of the COVID 19 global pandemic. Despite the challenges and difficulties of collaborative team work during the early months of the project, the work progressed well and produced outcomes that significantly improved the understanding of the next phase of design work. Through amendments to Exhibit A in September 2021 and February 2022, the scope of work for Phase 2 of the contract was revised.

Related to Priority Projects

  • Priority Hiring If the Contract Amount is over $200,000 and this Agreement is for services (other than Consulting Services), this section is applicable. Contractor shall give priority consideration in filling vacancies in positions funded by this Agreement to qualified recipients of aid under Welfare and Institutions Code section 11200 in accordance with PCC 10353.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SENIORITY PROVISIONS A. Seniority

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Priority of Documents The documents forming the Contract are to be taken as mutually explanatory of one another. For the purposes of interpretation, the priority of the documents shall be in accordance with the following sequence:

  • PRIORITY OF USE Any schedule or milestone in this Agreement is estimated based upon the Parties' current understanding of the projected availability of NASA goods, services, facilities, or equipment. In the event that NASA's projected availability changes, Partner shall be given reasonable notice of that change, so that the schedule and milestones may be adjusted accordingly. The Parties agree that NASA's use of the goods, services, facilities, or equipment shall have priority over the use planned in this Agreement. Should a conflict arise, NASA in its sole discretion shall determine whether to exercise that priority. Likewise, should a conflict arise as between two or more non-NASA Partners, NASA, in its sole discretion, shall determine the priority as between those Partners. This Agreement does not obligate NASA to seek alternative government property or services under the jurisdiction of NASA at other locations.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Seniority Tie Breaker The Employer and the Union agree that where there is a tie in seniority between two or more Employees, a determination of seniority shall be made in the following manner:

Time is Money Join Law Insider Premium to draft better contracts faster.