STANDARD FILE NAMING CONVENTION Sample Clauses

STANDARD FILE NAMING CONVENTION. ROADWAY aa## aa = Plan sheet type (will be more than two digits in some instances) ## = Number identifying the number of drawings of the same type, i.e., 01, 02, 03, ... (Minimum of two digits are necessary.) FILE FOLDER STRUCTURE CSJ _Hwy Subfolders This folder contains the .gpk file, all input files, output files and other files generated using the program.
AutoNDA by SimpleDocs

Related to STANDARD FILE NAMING CONVENTION

  • File Naming Conventions Files will be named according to the following convention: {gTLD}_{YYYY-MM-DD}_{type}_S{#}_R{rev}.{ext} where: {gTLD} is replaced with the gTLD name; in case of an IDN-TLD, the ASCII-compatible form (A-Label) must be used; {YYYY-MM-DD} is replaced by the date corresponding to the time used as a timeline watermark for the transactions; i.e. for the Full Deposit corresponding to 2009-08-02T00:00Z, the string to be used would be “2009-08-02”; {type} is replaced by: “full”, if the data represents a Full Deposit; “diff”, if the data represents a Differential Deposit; “thin”, if the data represents a Bulk Registration Data Access file, as specified in Section 3 of Specification 4; {#} is replaced by the position of the file in a series of files, beginning with “1”; in case of a lone file, this must be replaced by “1”. {rev} is replaced by the number of revision (or resend) of the file beginning with “0”: {ext} is replaced by “sig” if it is a digital signature file of the quasi-homonymous file. Otherwise it is replaced by “ryde”.

  • Certification of Meeting or Exceeding Tobacco-Free Workplace Policy Minimum Standards A. Grantee certifies that it has adopted and enforces a Tobacco-Free Workplace Policy that meets or exceeds all of the following minimum standards of: i. Prohibiting the use of all forms of tobacco products, including but not limited to cigarettes, cigars, pipes, water pipes (hookah), bidis, kreteks, electronic cigarettes, smokeless tobacco, snuff and chewing tobacco; ii. Designating the property to which this Policy applies as a "designated area,” which must at least comprise all buildings and structures where activities funded under this Grant Agreement are taking place, as well as Grantee owned, leased, or controlled sidewalks, parking lots, walkways, and attached parking structures immediately adjacent to this designated area; iii. Applying to all employees and visitors in this designated area; and iv. Providing for or referring its employees to tobacco use cessation services. B. If Grantee cannot meet these minimum standards, it must obtain a waiver from the System Agency.

  • Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Files Subject to Florida's Public Records Law Any file, report, record, document, paper, letter, or other material received, generated, maintained or sent by Grantee to Florida Housing or its agent(s) in connection with this agreement is subject to the provisions of Section 119.01- .15, Fla. Stat., as may be amended from time to time (Florida's Public Records Law). Grantee represents and acknowledges that it has read and understands Florida's Public Records Law and agrees to comply with Florida's Public Records Law.

  • Authorization and Application of Overtime An employee who is required to work overtime shall be entitled to overtime compensation when the overtime worked is authorized in advance.

  • Professional Qualifications It shall be a condition of continued professional employment that employees must apply for enrolment in their appropriate professional licensing body by the thirtieth day of continuous service.

  • NATIONAL JOINT COUNCIL AGREEMENTS 22.1 Subject to the National Joint Council By-Laws, agreements concluded by the National Joint Council of the Public Service on items which may be included in a collective agreement, and which the parties to this agreement have endorsed after December 6, 1978, will form part of this collective agreement, subject to the Federal Public Sector Labour Relations Act (FPSLRA) and any legislation by Parliament that has been or may be, as the case may be, established pursuant to any Act prescribed in Section 113(b) of the PSLRA. 22.2 NJC items which may be included in a collective agreement are those items which the parties to the NJC agreements have designated as such or upon which the Chairman of the Federal Public Sector Labour Relations Board has made a ruling pursuant to (c) of the NJC Memorandum of Understanding which became effective December 6, 1978 22.3 The following directives, as amended from time to time by National Joint Council recommendation and which have been approved by the National Research Council Canada, form part of this Agreement: - Bilingualism Bonus Directive - Commuting Assistance Directive - Occupational Health and Safety Directive - Relocation Directive - Travel Directive - First Aid to the General Public – Allowances for Employees - Public Service Health Care Plan - Uniforms Directive 22.4 During the term of this Agreement, other directives may be added to the above noted list. 22.5 Grievances in regard to the above directives shall be presented in accordance with clause 19.1 of the Grievance Procedure article of this Agreement.

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • Public Records Law The Contractor shall assist the County in fulfilling all obligations of the County under the Washington Public Records Act (chapter 42.56 of the Revised Code of Washington). In the event that the Contractor fails to fulfill its obligations pursuant to this section and due in whole or in part to such failure a court of competent jurisdiction imposes a penalty upon the County for violation of the Public Records Act, Contractor shall indemnify the County for that penalty, as well as for all costs and attorney fees incurred by the County in the litigation giving rise to such a penalty. The obligations created by this section shall survive the termination of this contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!