Requests For Samples By Authorized Users Requests for samples by Authorized Users require the consent of the Contractor. Where Contractor refuses to furnish a sample, Authorized User may, in its sole discretion, make a determination on the performance capability of the Product or on the issue in question. BID EVALUATION
Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.
Product Warranty for Software Deliverables During the Project warranty period, defects in the materials or workmanship of the Software Deliverables specified and furnished by or through Contractor shall be repaired or replaced by Contractor at no cost or expense to the Authorized User. Contractor shall extend the Project warranty period by the cumulative period(s) of time, after notification, during which the Software Deliverables require servicing or replacement (down time) or is in the possession of the Contractor, its agents, officers, Subcontractors, distributors, resellers or employees . The Commissioner agrees that Contractor is not responsible for any modification of the Software Deliverables made by an Authorized User without Contractor’s approval.
Additional Requirements for Sleeping Rooms The Contractor shall provide departing Attendees a secured area for storing belongings.
Public Contracts for Services [Not applicable to agreements relating to the offer, issuance, or sale of securities, investment advisory services or fund management services, sponsored projects, intergovernmental agreements, or information technology services or products and services] Contractor certifies, warrants, and agrees that it does not knowingly employ or contract with a worker without authorization who will perform work under this Agreement and will confirm the employment eligibility of all employees who are newly hired for employment in the United States to perform work under this Agreement, through participation in the E-Verify Program or the Department program established pursuant to C.R.S. §8-17.5-102(5)(c). Contractor shall not knowingly employ or contract with a worker without authorization to perform work under this Agreement or enter into a contract with a subcontractor that fails to certify to Contractor that the subcontractor shall not knowingly employ or contract with a worker without authorization to perform work under this Agreement. Contractor (a) shall not use E-Verify Program or Department program procedures to undertake pre-employment screening of job applicants while this Agreement is being performed, (b) shall notify the subcontractor and County within three days if Contractor has actual knowledge that a subcontractor is employing or contracting with a worker without authorization for work under this Agreement, (c) shall terminate the subcontract if a subcontractor does not stop employing or contracting with the worker without authorization within three days of receiving the notice, and (d) shall comply with reasonable requests made in the course of an investigation, undertaken pursuant to C.R.S. §8-17.5-102(5), by the Colorado Department of Labor and Employment. If Contractor participates in the Department program, Contractor shall deliver to County a written, notarized affirmation, affirming that Contractor has examined the legal work status of such employee, and shall comply with all of the other requirements of the Department program. If Contractor fails to comply with any requirement of this provision or C.R.S. §8-17.5-102 et seq., County may terminate this Agreement for breach and, if so terminated, Contractor shall be liable for damages.
Basis for Layoff A. The reasons for layoffs include, but are not limited to, the following:
Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.
Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.
Packing Materials and Containers for Shipment Packing materials and containers in which a good is packed for shipment shall be disregarded in determining whether:
System for Award Management (XXX) Requirement Alongside a signed copy of this Agreement, Grantee will provide Florida Housing with a XXX.xxx proof of registration and Commercial and Government Entity (CAGE) number. Grantee will continue to maintain an active XXX registration with current information at all times during which it has an active award under this Agreement.