Protection of Defense Capabilities Sample Clauses

Protection of Defense Capabilities. It is a priority for the DAF to protect national defense capabilities and military operations, including military installations, research, development, test and evaluation activities, and military readiness activities from compromise and exploitation that may occur due to an activity under foreign control operating in the vicinity of those national defense capabilities and military operations.
AutoNDA by SimpleDocs
Protection of Defense Capabilities. It is a priority for the MILDEP to protect national defense capabilities and military operations, including military installations, research, development, test and evaluation activities, and military readiness activities from compromise and exploitation that may occur due to an activity under foreign control operating in the vicinity of those national defense capabilities and military operations.
Protection of Defense Capabilities. It is a priority for the DoD Parties to protect national defense capabilities and military operations, including military installations, research, development, test and evaluation activities, and military readiness activities from compromise and exploitation that may occur due to an activity under foreign ownership, control, or influence operating in the vicinity of those national defense capabilities and military operations. This agreement is structured to ensure the Project Owner may construct and operate the Project, while permitting the DoD Parties to continuously screen for, and when necessary, negotiate with the Project Owner to mitigate threats to national security posed by the access of any person or entity to the wind turbine structures and associated data systems in proximity to sensitive military activities.

Related to Protection of Defense Capabilities

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

  • Contractor Responsibilities 19.1. Contractor shall perform national criminal history checks for Ohio, Indiana, and Kentucky, and 10-panel drug screening tests on all prospective employees performing work under this RFP or coming onto a CMHA property and any resulting contract and provide summaries of the results to the Authority if requested. For the purposes of this section, the term “employees” includes contractor. Prospective employees whose criminal background check discloses a misdemeanor or felony involving crimes of moral turpitude, sexual offenses or harm to persons or property shall not be employed to perform work under this RFP or any resulting contract. Contractor is required to perform drug screening of all employees and to ensure acceptable test results. Criminal history and drug screening checks will be completed at the sole expense of the contractor. Any employee of the Contractor suspected of being under the influence of drugs and or alcohol will be reported to the appropriate personnel at CMHA and/or other local law enforcement. If the employee is determined to be under the influence of drugs or alcohol in any form or manner, or believed by proper authority to be dealing in illicit sale of alcohol or drugs they will be removed and shall not be allowed to return to any job site on the Authority’s property. The Contractor’s contract may be suspended and/or terminated should such a situation occur or if the Contractor fails to submit results pursuant to this section. 19.1.1. If CMHA requests additional drug screening, the test shall be performed within 24 hours and the summary shall be sent directly to CMHA from the testing facility. 19.2. Contractor(s) shall provide uniforms and ID Badges identifying Contractor for all employees working on CMHA’s properties. No employees will be allowed on CMHA’s properties out of uniform and without his/her ID badge on his/her person. Contractor(s) must submit a picture of the uniform and a sample of his/her ID badge if requested by CMHA. 19.3. Contractor’s personnel shall be neat and conduct all work in a professional and efficient manner. If any employee of Contractor is deemed unacceptable by CMHA, Contractor shall immediately replace such personnel with an acceptable substitute to CMHA. 19.4. Contractor(s) shall practice acceptable safety precautions so as not to cause harm to any persons or property while performing services under this RFP or any resulting contract. Contractor(s) shall follow industry safety standards, and use only industry approved safety equipment in accordance with the manufacturer’s specifications in the performance of all duties. 19.5. Contractor(s) shall pay all of its employees, including any and all approved Sub-Contractors, at least the legal minimum wages as determined by the United States Department of Labor and the United States Department of Housing and Urban Development and Department of Labor Prevailing Wage. Wage Determinations can be accessed via the Department of Labor website, xxx.xxxx.xxx. 19.6. Upon completion of the work, Contractor(s) shall clean up the area where the work was performed and Contractor(s) shall remove any debris generated by the products and/or services at CMHA premises. At no time, will Contractor(s) discard debris into any CMHA refuse container. 19.7. Contractor(s) shall clearly mark all work areas that might reasonably be expected to endanger the health and safety of residents, guests, or any other persons. Contractor(s) will provide such signs, markers and barricades as required to identify all work areas and minimize inherent dangers. 19.8. The contractor shall be responsible for notifying CMHA immediately of any damages (i.e. fire, container leaking) deemed to be a health or safety hazard whether the damage is caused by the contractor or other means. 19.9. The Contractor shall be responsible for safeguarding all CMHA property provided for Contractor use. At the close of each workday, CMHA facilities, property and materials shall be inspected and secured.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Acts of Terrorism Exclusion With respect to each Mortgage Loan over $20 million, as of origination the related special-form all-risk insurance policy and business interruption policy (issued by an insurer meeting the Insurance Rating Requirements) do not specifically exclude Acts of Terrorism, as defined in the Terrorism Risk Insurance Act of 2002, as amended by the Terrorism Risk Insurance Program Reauthorization Act of 2007 and the Terrorism Risk Insurance Program Reauthorization Act of 2015 (collectively referred to as “TRIPRA”), from coverage, or if such coverage is excluded, it is covered by a separate terrorism insurance policy. With respect to each Mortgage Loan, the related Mortgage Loan documents do not expressly waive or prohibit the Mortgagee from requiring coverage for Acts of Terrorism, as defined in TRIPRA, or damages related thereto, except to the extent that any right to require such coverage may be limited by commercial availability on commercially reasonable terms, or as otherwise indicated on Schedule C; provided, that if TRIPRA or a similar or subsequent statute is not in effect, then, provided that terrorism insurance is commercially available, the Mortgagor under each Mortgage Loan is required to carry terrorism insurance, but in such event the Mortgagor shall not be required to spend on terrorism insurance coverage more than two times the amount of the insurance premium that is payable in respect of the property and business interruption/rental loss insurance required under the related Mortgage Loan documents (without giving effect to the cost of terrorism and earthquake components of such casualty and business interruption/rental loss insurance) at the time of the origination of the Mortgage Loan, and if the cost of terrorism insurance exceeds such amount, the Mortgagor is required to purchase the maximum amount of terrorism insurance available with funds equal to such amount.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Audit of Existing Content and Functionality By September 1, 2017, the Recipient will propose for OCR’s review and approval the identity and bona fides of an Auditor (corporation or individual) to audit all content and functionality on its website, including, but not limited to, the home page, all subordinate pages, and intranet pages and sites, to identify any online content or functionality that is inaccessible to persons with disabilities, including online content and functionality developed by, maintained by, or offered through a third party vendor or an open source. The Auditor will have sufficient knowledge and experience in website accessibility for people with disabilities to carry out all related tasks, including developing a Proposed Corrective Action Plan. The Audit will use the Benchmarks for Measuring Accessibility set out above, unless the Recipient receives prior permission from OCR to use a different standard as a benchmark. During the Audit, the Recipient will also seek input from members of the public with disabilities, including parents, students, employees, and others associated with the Recipient, and other persons knowledgeable about website accessibility, regarding the accessibility of its online content and functionality.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!