REGIONAL INTERCEPTORS Sample Clauses

REGIONAL INTERCEPTORS. Regional Interceptors are a part of the Regional Sewerage System and their design and construction or acquisition shall be financed as provided in section 9 hereof. Any Contracting Agency may make a written request to CBMWD for a determination as to whether or not an existing sewer has become a Regional Interceptor. Each such request received by CBMWD shall be referred to the Regional Technical Committee and such committee shall make a written recommendation to the Board of Directors of CBMWD as to whether or not the interceptor in question shall be acquired by CBMWD as a Regional Interceptor. Any Contracting Agency which disagrees with such a recommendation of the Regional Technical Committee may file a written request for a hearing thereon with the Secretary of the Board of Directors of CBMWD. Upon receipt of such a request, said Board of Directors shall schedule and conduct a hearing and give notice thereof in accordance with the provisions of section 26A hereof. Notwithstanding the preceding provisions of this section, a sewer which is utilized for the transmission of sewage of two or more Contracting Agencies and which is transmitting less than 300,000 gallons per day of sewage for the most upstream Contracting Agency shall not be acquired by CBMWD as a Regional Interceptor unless it is determined by the Board of Directors of CBMWD after recommendation by the Regional Technical Committee that such acquisition is in the best interest of the Regional Sewerage System. (Amended April 12, 1984) Section 6. (DELETED April 12, 1984)
AutoNDA by SimpleDocs

Related to REGIONAL INTERCEPTORS

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

  • Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • Crossing Picket Lines The Company will not expect an employee to cross a picket line, including a picket line at a customer site, if to do so would place the employee's life, limb or personal property in jeopardy.

  • Virus detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Fire, Life Safety, and Accessibility Codes The following codes, in the versions approved by the Georgia State Fire Marshal/Fire Safety Commissioner and Department of Human Resources, shall be used. The Design Professional will designate any additional codes or special modifications in the Supplementary General Conditions.

  • Vientisäätely Sitoudut siihen, ettei Apple-ohjelmistoa viedä edelleen suorasti eikä epäsuorasti ulkomaille, ellei tähän ole erikseen annettu lupaa Yhdysvaltain tai sen oikeustoimialueen/niiden oikeustoimialueiden laeissa, jo(i)sta Apple-ohjelmisto on hankittu. Erityisesti Apple-ohjelmistoa ei saa viedä suorasti tai epäsuorasti (a) Yhdysvaltojen vientikiellossa olevaan maahan tai (b) kenellekään U.S. Treasury Departmentin Specially Designated Nationals -luettelossa olevalle tai U.S. Department of Commercen Denied Person’s List- tai Entity List -luetteloissa tai missään muissa rajoitusten alaisten osapuolten luetteloissa olevalle. Apple-ohjelmistoa käyttämällä annat takuun siitä, ettet ole missään tällaisessa maassa tai luettelossa. Takaat myös, että et käytä Apple-ohjelmistoa mihinkään sellaiseen tarkoitukseen, joka on kielletty Yhdysvaltain laissa, mukaan lukien (mutta näihin rajoittumatta) ohjusten, ydinaseiden tai kemiallisten tai biologisten aseiden kehitys, suunnittelu, valmistus tai tuotanto.

  • Spam 3.1 Also known as junk mail or Unsolicited Commercial Email (UCE), the term "spam" refers to submitting a commercial email or SMS message to a large number of recipients who have not requested or opted to receive it and have no reasonable expectation to receiving email or SMS from the sender.

  • Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Internet Safety X. Xxxxxxx and Users - Despite every effort for supervision and filtering, all Users and their parents/guardians are advised that access to the electronic Network may include the potential for access to materials inappropriate for school-aged students. Every User must take responsibility for his or her use of the Network and Internet and avoid these sites.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!