TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees. 2. Where an employee is absent from work because of illness or accident and has advised the company in accordance with Clause 33 – Personal Leave of the award, the company shall ensure that the employee’s tools are securely stored during his/her absence.
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.
Customer and Trade Relations As of the Closing Date, there exists no actual or, to the knowledge of any Credit Party, threatened termination or cancellation of, or any material adverse modification or change in: the business relationship of any Credit Party with any customer or group of customers whose purchases during the preceding 12 months caused them to be ranked among the ten largest customers of such Credit Party; or the business relationship of any Credit Party with any supplier material to its operations.
STATUS OF CONTRACTOR 20 CONTRACTOR is, and shall at all times be deemed to be, an independent contractor and shall be 21 wholly responsible for the manner in which it performs the services required of it by the terms of this 22 Agreement. CONTRACTOR is entirely responsible for compensating staff, subcontractors, and 23 consultants employed by CONTRACTOR. This Agreement shall not be construed as creating the 24 relationship of employer and employee, or principal and agent, between COUNTY and CONTRACTOR 25 or any of CONTRACTOR’s employees, agents, consultants, or subcontractors. CONTRACTOR 26 assumes exclusively the responsibility for the acts of its employees, agents, consultants, or 27 subcontractors as they relate to the services to be provided during the course and scope of their 28 employment. CONTRACTOR, its agents, employees, consultants, or subcontractors, shall not be 29 entitled to any rights or privileges of COUNTY employees and shall not be considered in any manner to 30 be COUNTY employees. 31
Status of Seller The Seller is not an “investment company” within the meaning of the Investment Company Act of 1940, as amended. The Seller is not subject to regulation as a “holding company”, an “affiliate” of a “holding company”, or a “subsidiary company” of a “holding company”, within the meaning of the Public Utility Holding Company Act of 1935, as amended.
Use of School Equipment The Association shall have the right to use school facilities and equipment for official Association business, including typewriters, duplicating equipment, computers and all types of audiovisual equipment at reasonable times and when such equipment is not otherwise in use, and shall provide advance notice of such use to the Superintendent of Schools. The Association shall pay for the cost of all materials and supplies.
Contractor Licensing, etc. Notwithstanding Section 14.c, District may terminate this Contract immediately by written notice to Contractor upon denial, suspension, revocation, or non-renewal of any license, permit, or certificate that Contractor must hold to provide services under this Contract.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section. 1.10.1 Registry Operator will offer searchability on the web-‐based Directory Service. 1.10.2 Registry Operator will offer partial match capabilities, at least, on the following fields: domain name, contacts and registrant’s name, and contact and registrant’s postal address, including all the sub-‐fields described in EPP (e.g., street, city, state or province, etc.). 1.10.3 Registry Operator will offer exact-‐match capabilities, at least, on the following fields: registrar id, name server name, and name server’s IP address (only applies to IP addresses stored by the registry, i.e., glue records). 1.10.4 Registry Operator will offer Boolean search capabilities supporting, at least, the following logical operators to join a set of search criteria: AND, OR, NOT. 1.10.5 Search results will include domain names matching the search criteria. 1.10.6 Registry Operator will: 1) implement appropriate measures to avoid abuse of this feature (e.g., permitting access only to legitimate authorized users); and 2) ensure the feature is in compliance with any applicable privacy laws or policies.