Protected Resources Sample Clauses

Protected Resources. 36. If any PARTY discovers unanticipated cultural, archaeological, paleontological, or other protected resources during WORK, all WORK in that area will stop and that PARTY will notify all PARTIES within 24 hours of discovery. WORK may only resume after a qualified professional has evaluated the nature and significance of the discovery and CALTRANS approves a plan for its removal or protection. Disclosures
AutoNDA by SimpleDocs
Protected Resources. If any PARTY discovers unanticipated cultural, archaeological, paleontological, or other protected resources during WORK, all WORK in that area will stop and that PARTY will notify all PARTIES within 24 hours of discovery. WORK may only resume after a qualified professional has evaluated the nature and significance of the discovery and CALTRANS approves a plan for its removal or protection. Disclosures PARTIES will hold all administrative drafts and administrative final reports, studies, materials, and documentation relied upon, produced, created, or utilized for the WORK in confidence to the extent permitted by law and where applicable, the provisions of California Government Code, Section 6254.5(e) will protect the confidentiality of such documents in the event that said documents are shared between PARTIES. PARTIES will not distribute, release, or share said documents with anyone other than employees, agents, and consultants who require access to complete the WORK without the written consent of the PARTY authorized to release them, unless required or authorized to do so by law. If a PARTY receives a public records request pertaining to the WORK, that PARTY will notify PARTIES within five (5) working days of receipt and make PARTIES aware of any disclosed public records.
Protected Resources. Chip 1. None

Related to Protected Resources

  • Justification and Anticipated Results The Privacy Act requires that each matching agreement specify the justification for the program and the anticipated results, including a specific estimate of any savings. 5 U.S.C. § 552a(o)(1)(B).

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • UPDATING AND DISCLOSING FINANCIAL INFORMATION You will provide facts to update information contained in Your original Account application or other financial information related to You, at Our request. You also agree that We may, from time to time, as We deem necessary, make inquiries pertaining to Your employment, credit standing and financial responsibility in accordance with applicable laws and regulations. You further agree that We may give information about the status and payment history of Your Account to consumer credit reporting agencies, a prospective employer or insurer, or a state or federal licensing agency having any apparent legitimate business need for such information.

  • Verizon Information Upon request by CBB, Verizon shall make available to CBB the following information to the extent that Verizon provides such information to its own business offices: a directory list of relevant NXX codes, directory and Customer Guide close dates, and Yellow Pages headings. Verizon shall also make available to CBB, on Verizon’s Wholesale website (or, at Verizon’s option, in writing) Verizon’s directory listings standards and specifications.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

  • Budget Information Funding Source Funding Year of Appropriation Budget List Number Amount EPIC 18-19 301.001F $500,000 EPIC 20-21 301.001H $500,000 R&D Program Area: EDMFO: EDMF TOTAL: $ 1,000,000 Explanation for “Other” selection Reimbursement Contract #: Federal Agreement #:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!