Safeguard of Paris and Berne Conventions Sample Clauses

Safeguard of Paris and Berne Conventions. This Treaty shall not affect the obligations that any Contracting Party may have under the Paris Convention for the Protection of Industrial Property or the Berne Convention for the Protection of Literary and Artistic Works.
AutoNDA by SimpleDocs

Related to Safeguard of Paris and Berne Conventions

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • Family Educational Rights and Privacy Act The Charter School is subject to all provisions of the Federal Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g. In the event the Charter School closes, it shall transmit all official student records in the manner prescribed by the State Board.

  • Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.

  • Training and Professional Development 11.1 The Employer will develop and maintain an employee training and development plan and provide such plan to the Union upon request. Staff training is intended to provide an opportunity for classified staff employees for training sponsored by the University Training and Development and the UW Medical Centers Organizational Development and Training. Education/Professional Leave is intended to facilitate employee access to continuing education opportunities. Training and educational/professional leave may be used for the purpose of improving job performance, maintaining and increasing proficiency, preparing staff for greater responsibility, or increasing promotional opportunities within the framework of staff positions available at the University. 11.2 Any release time for training for employees accepted for such classes shall be in accordance with the Executive Order (currently No. 52) governing this matter. In the event that two or more employees request the same training period and supervision must limit the number of persons who may participate at one time due to work requirements, the selection will be made on a mutually agreeable basis within the department. 11.3 The training program is a proper subject for discussion by either departmental or University-wide Joint Union/Management Committees. 11.4 If the Employer requires an employee to receive training, reimbursement will be provided in accordance with the University travel rules. Employee attendance at Employer required training, either during or outside working hours, will be considered time worked and compensated in accordance with the provisions of this Agreement. 11.5 Employee attendance at training not required by the Employer and not covered by Executive Order 52, either on approved leave from or outside of working hours, will be voluntary and not considered time worked.

  • Compliance with Federal Law, Regulations, and Executive Orders This is an acknowledgement that FEMA financial assistance will be used to fund all or a portion of the contract. The contractor will comply with all applicable Federal law, regulations, executive orders, FEMA policies, procedures, and directives.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Regulatory Requirements Each Party’s obligations under this Agreement shall be subject to its receipt of any required approval or certificate from one or more Governmental Authorities in the form and substance satisfactory to the applying Party, or the Party making any required filings with, or providing notice to, such Governmental Authorities, and the expiration of any time period associated therewith. Each Party shall in good faith seek and use its Reasonable Efforts to obtain such other approvals. Nothing in this Agreement shall require Developer to take any action that could result in its inability to obtain, or its loss of, status or exemption under the Federal Power Act or the Public Utility Holding Company Act of 2005 or the Public Utility Regulatory Policies Act of 1978, as amended.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!