Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA.
Procurement of Goods Part A: General Goods shall be procured in accordance with the provisions of Section I of the “Guidelines for Procurement under IBRD Loans and XXX Credits” published by the Bank in January 1995 and revised in January and August 1996, September 1997 and January 1999 (the Guidelines) and the following provisions of Section I of this Schedule. Part B: International Competitive Bidding
Procurement of Goods and Works 3. Except as ADB may otherwise agree, Goods and Works shall only be procured on the basis of the methods of procurement set forth below:
Required Procurement Procedures for Obtaining Goods and Services The Grantee shall provide maximum open competition when procuring goods and services related to the grant-assisted project in accordance with Section 287.057, Florida Statutes.
Use of local labour professional services and materials 10. (1) The Company shall, for the purposes of this Agreement —
Other Methods of Procurement of Goods and Works The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods and works. The Procurement Plan shall specify the circumstances under which such methods may be used: Procurement Method
Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.
Support and Services ISD and HC agree to the following conditions:
Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:
Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.