RECIPROCAL FIRE PROTECTION (MUTUAL AID Sample Clauses

RECIPROCAL FIRE PROTECTION (MUTUAL AID. As deemed appropriate, the Parties will include within the AOP reciprocal Initial Attack response areas for lands of intermingled or adjoining protection responsibilities. Within such areas the Supporting Party will, upon request or voluntarily, take Initial Attack action in support of the Protecting Party. The Protecting Party will not be required to reimburse the Supporting Party for initial attack actions taking place in these areas within the first 2 hours following initial dispatch of suppression resources. All assistance beyond this Mutual Aid period will be Assistance by Hire and will be billed retroactively for the full period from the time of initial dispatch. Reciprocal initial attack will follow the guidelines specified in the current AOP.
AutoNDA by SimpleDocs
RECIPROCAL FIRE PROTECTION (MUTUAL AID. For the purposes of this section, Mutual Aid is that automatic initial attack response by suppression resources and specified in the Local Area Operating Plans for specific pre-planned initial attack response areas. The Local Area Operating Plan will identify those initial attack resources that will be provided at no cost to the protecting agency as mutual aid. Mutual Aid will be limited to 24 hours from the time of initial report. Mutual Aid resources should be released as soon as possible. In no case shall they be held beyond the 24-hour mutual aid period without consent of the supporting agency. All assistance beyond these Mutual Aid periods will be Assistance by Hire, and will be billed retroactively for the full period from the time of initial dispatch. Aircraft (fixed and rotary-winged, including pilot(s)) shall always be Assistance by Hire.

Related to RECIPROCAL FIRE PROTECTION (MUTUAL AID

  • Streamcourse Protection “Streamcourses” that are subject to provisions of this Section are shown on Sale Area Map. Unless otherwise agreed, the following measures shall be observed to protect Streamcourses:

  • Demographic, Classification and Wage Information XXXXXX agrees to coordinate the accumulation and distribution of demographic, classification and wage data, as specified in the Letter of Understanding dated December 14, 2011, to CUPE on behalf of Boards of Education. The data currently housed in the Employment Data and Analysis Systems (EDAS) will be the source of the requested information.

  • PayPal's Seller Protection Program If you sell a good or service to a buyer, you may be eligible for PayPal's Seller Protection program. When it applies, PayPal's Seller Protection program entitles you to retain the full purchase amount. PayPal determines, in its sole discretion, whether your claim is eligible for PayPal’s Seller Protection Program. There is no limit on the number of payments eligible for PayPal's Seller Protection program. By accessing the transaction details page in your PayPal account you can see transactions that may be eligible for protection under this program. The Seller Protection Program terms and conditions are set out in the PayPal’s Seller Protection Program page and form part of this User Agreement.

  • Open Source Assurance Program For Software that is Red Hat branded, purchases under this Agreement may entitle Client to participate in Red Hat’s Open Source Assurance Program which is described at xxxx://xxx.xxxxxx.xxx/rhel/details/assurance/. The terms for this optional program are subject to a separate agreement which can be viewed at xxxx://xxx.xxxxxx.xxx/legal/open_source_assurance_agreement.html.

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Where BellSouth uses Integrated Digital Loop Carrier (IDLC) systems to provide the local loop and BellSouth has a suitable alternate facility available, BellSouth will make arrangements to permit OnePoint to order a contiguous local loop. To the extent it is technically feasible, these arrangements will provide OnePoint with the capability to serve end users at a level that is at parity with the level of service BellSouth provides its customers. If no alternate facility is available, BellSouth will utilize its Special Construction (SC) process to determine the additional costs required to provision the loop facilities. OnePoint will then have the option of paying the one-time SC rates to place the loop facilities or OnePoint may chose some other method of providing service to the end-user (e.g., Resale, private facilities, etc.).

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Whistle Blowing Protection The Employer agrees to adhere to the whistle blowing protection pursuant to the Long-Term Care Homes Act (LTCHA).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!