Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.
Protection of Watershed PURCHASER shall take all necessary precautions to prevent damage to stream banks, any stream course, lake, reservoir, or forested wetland within or adjacent to the timber sale area. Definitions of Type F, Type D, and Type N streams contained in the Forest Practices Act apply to this contract. In addition to other protective measures required, PURCHASER shall discontinue all or part of the operations under this contract upon notice from STATE that operations will cause excessive damage to the watershed.
Protection Planning Annually, sub-geographic area Unit Administrators will determine efficiencies to be gained from reciprocal assistance and acquisition of protection services. Operating plans will document decisions. Plans should be reviewed, and agreement reached concerning such items as placement of crews, engines, air tankers, helicopters, fixed and aerial detection, regulated use, closures and other joint fire suppression efforts.
Protection of Human Subjects The Recipient agrees to comply with the requirements of the National Research Act, as amended, 42 U.S.C. §§ 289 et seq., and U.S. DOT regulations, “Protection of Human Subjects,” 49 C.F.R. Part 11, pertaining to protections for human subjects participating in or involved in research, development, and activities related to the Project.
Historic Preservation Subrecipient agrees to comply with the Historic Preservation requirements set forth in the National Historic Preservation Act of 1966, as amended (16 U.S.C. 470) and the procedures set forth in 36 CFR 800, Protection of Historic Properties, insofar as they apply to the performance of this Contract. In general, this requires concurrence from the State Historic Preservation Officer for all rehabilitation and demolition of historic properties that are fifty years old or older or that are included on a Federal, State, or local historic property list.
Wetlands Protection Xxxxxxxx requiring protection under Executive Order 11990 are shown on Sale Area Map. Vehicular or skidding equipment shall not be used in such wetlands, except where roads, landings, and tractor roads are approved under B5.1 or B6.422. Additional measures needed to protect such areas are provided in C6.62.
Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position:
ENVIRONMENT, SAFETY AND HEALTH PROTECTION (a) Seller shall perform this Agreement in a manner that ensures adequate protection for workers, the public, and the environment, and shall be accountable for actions of itself and its lower-tier subcontractors, agents and employees. Seller shall exercise a degree of care commensurate with the work and the associated hazards. Seller shall ensure that management of environment, safety and health (ES&H) functions and activities is an integral and visible part of Seller’s work planning and execution process. In the event that Xxxxxx fails to comply with this Agreement, Company may, without prejudice to any other legal or contractual rights, issue an order stopping all or any part of the work; thereafter a start order for resumption of work may be issued at Company’s discretion. Seller shall make no claim for an extension of time or for compensation or damages by reason of or in connection with such work stoppage. In addition, Company may require, in writing, that Seller remove from the work any employee the Company deems unsafe, incompetent, careless, or otherwise objectionable.
Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:
Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.