Quotations for New Vessels Sample Clauses

Quotations for New Vessels 

Related to Quotations for New Vessels

  • RATES FOR NEW JOBS When a new job is placed in a unit and cannot be properly placed in an existing classification, the Employer will notify the Union prior to establishing a classification and rate structure. In the event the Union does not agree that the description and rate are proper, it shall be subject to negotiation. The Employer will consult with the Union as to whether or not such new job is within the bargaining unit.

  • Measurements and arithmetic conventions All measurements and calculations shall be in the metric system and calculations done to 2 (two) decimal places, with the third digit of 5 (five) or above being rounded up and below 5 (five) being rounded down.

  • CLASSIFICATIONS AND WAGE RATES A current list of Field job classifications and applicable wage rates for the Nevada Irrigation District are set forth in the District Wage Schedule.

  • Other Types of Traffic 8.1 Notwithstanding any other provision of this Agreement or any Tariff: (a) the Parties’ rights and obligations with respect to any intercarrier compensation that may be due in connection with their exchange of Internet Traffic shall be governed by the terms of the FCC Internet Order and other applicable FCC orders and FCC Regulations; and, (b) a Party shall not be obligated to pay any intercarrier compensation for Internet Traffic that is in excess of the intercarrier compensation for Internet Traffic that such Party is required to pay under the FCC Internet Order and other applicable FCC orders and FCC Regulations. 8.2 Subject to Section 8.1 of this Attachment, interstate and intrastate Exchange Access, Information Access, exchange services for Exchange Access or Information Access, and Toll Traffic, shall be governed by the applicable provisions of this Agreement and applicable Tariffs. 8.3 For any traffic originating with a third party carrier and delivered by Ymax to Verizon, Ymax shall pay Verizon the same amount that such third party carrier would have been obligated to pay Verizon for termination of that traffic at the location the traffic is delivered to Verizon by Ymax. 8.4 Any traffic not specifically addressed in this Agreement shall be treated as required by the applicable Tariff of the Party transporting and/or terminating the traffic. 8.5 The Parties may also exchange Internet Traffic at the technically feasible Point(s) of Interconnection on Verizon’s network in a LATA established hereunder for the exchange of Reciprocal Compensation Traffic. Any intercarrier compensation that may be due in connection with the Parties’ exchange of Internet Traffic shall be applied at such technically feasible Point of Interconnection on Verizon’s network in a LATA in accordance with the FCC Internet Order.

  • Arithmetical Errors 30.1 The tender sum as submitted and read out during the tender opening shall be absolute and final and shall not be the subject of correction, adjustment or amendment in any way by any person or entity. 30.2 Provided that the Tender is substantially responsive, the Procuring Entity shall handle errors on the following basis: a) Any error detected if considered a major deviation that affects the substance of the tender, shall lead to disqualification of the tender as non-responsive . b) Any errors in the submitted tender arising from a miscalculation of unit price, quantity, subtotal and total bid price shall be considered as a major deviation that affects the substance of the tender and shall lead to disqualification of the tender as non-responsive. and c) if there is a discrepancy between words and figures, the amount in words shall prevail. 30.3 Tenderers shall be notified of any error detected in their bid during the notification of a xxxx.

  • WAGE RATES AND CLASSIFICATIONS Classifications and the hourly wage rates applicable thereto are contained in the Appendices attached to and forming part of this Agreement.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following: i. Information pertaining to tuition rates, payments, and educational assistance payments; and

  • Sector Sub-Sector Industry Classification Level of Government Type of Obligation Description of Measure Source of Measure All sectors : : - : Central : National Treatment Senior Management and Board of Directors : National Treatment and the Senior Management and Board of Directors obligations shall not apply to any measure relating to small and medium sized domestic market enterprise2. Foreign equity is restricted to a maximum of 40% for domestic market enterprises with paid-in equity capital of less than the equivalent of USD 200,000 Note: Members of the Board of Directors or governing body of corporation or associations shall be allowed in proportion to their allowable participation or share in the capital of such enterprises. : -1987 Constitution of the Republic of the Philippines. - Foreign Investments Act of 1991 (R.A. No. 7042, as amended by R.A. No. 8179). -Presidential and Administrative Issuances. ∞ 2 The concept of a small and medium sized domestic market enterprise is an enterprise with paid in equity capital of less than the equivalent of USD 200,000.00.

  • Annual Evaluations The purpose of the annual evaluation is to assess and communicate the nature and extent of an employee's performance of assigned duties consistent with the criteria specified below in this Policy. Except for those employees who have received notice of non-reappointment pursuant to the BOT- UFF Policy on Non- reappointment, every employee shall be evaluated at least once annually. Personnel decisions shall take such annual evaluations into account, provided that such decisions need not be based solely on written faculty performance evaluations.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.