Storm Water Management Requirements Associated with Site Installation Sample Clauses

Storm Water Management Requirements Associated with Site Installation. When the proposed University Reserve construction begins, the following measures must be implemented to protect the storm drainage system. Storm drains located at the site must be protected and/or closed during any construction work. Appendix I present the Best Management Practices (BMP’s) for the following activities: • Erosion Control and Site Stabilization, • Building Repair, Remodeling and Construction, and • Construction, Demolition and Excavation Operations. Additionally, the Storm Water Pollution Prevention Plan (SWPPP) will be updated to reflect the installation of regulated features. The EPA issued the final rule on Wednesday 8 December 1999 that expanded the existing National Pollution Discharge Elimination System storm water program to address construction sites that disturb one to five acres. The State of California will be the implementing agency and has not yet developed regulations pertaining to this ruling. The goal of this rule is that implementation of Best Management Practices at small construction sites will result in a significant reduction in pollutant discharges and an improvement in surface water quality. The project will need to comply with the intent of the law and with any regulations that are formulated. Since the proposed University Reserve development is greater than 5acres, the developers must comply with the Phase 1 requirements mentioned above.
AutoNDA by SimpleDocs

Related to Storm Water Management Requirements Associated with Site Installation

  • No Release; Return or Destruction Each Party agrees not to release or disclose, or permit to be released or disclosed, any information addressed in Section 6.9(a) to any other Person, except its Representatives who need to know such information in their capacities as such (who shall be advised of their obligations hereunder with respect to such information), and except in compliance with Section 6.10. Without limiting the foregoing, when any such information is no longer needed for the purposes contemplated by this Agreement or any Ancillary Agreement, and is no longer subject to any legal hold or other document preservation obligation, each Party will promptly after request of the other Party either return to the other Party all such information in a tangible form (including all copies thereof and all notes, extracts or summaries based thereon) or notify the other Party in writing that it has destroyed such information (and such copies thereof and such notes, extracts or summaries based thereon); provided, that the Parties may retain electronic back-up versions of such information maintained on routine computer system backup tapes, disks or other backup storage devices; provided further, that any such information so retained shall remain subject to the confidentiality provisions of this Agreement or any Ancillary Agreement.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Access Control Landlord shall be the sole determinant of the type and amount of any access control or courtesy guard services to be provided to the Project, if any. IN ALL EVENTS, LANDLORD SHALL NOT BE LIABLE TO TENANT, AND TENANT HEREBY WAIVES ANY CLAIM AGAINST LANDLORD, FOR (I) ANY UNAUTHORIZED OR CRIMINAL ENTRY OF THIRD PARTIES INTO THE PREMISES, THE BUILDING OR THE PROJECT, (II) ANY DAMAGE TO PERSONS, OR (III) ANY LOSS OF PROPERTY IN AND ABOUT THE PREMISES, THE BUILDING OR THE PROJECT, BY OR FROM ANY UNAUTHORIZED OR CRIMINAL ACTS OF THIRD PARTIES, REGARDLESS OF ANY ACTION, INACTION, FAILURE, BREAKDOWN, MALFUNCTION AND/OR INSUFFICIENCY OF THE ACCESS CONTROL OR COURTESY GUARD SERVICES PROVIDED BY LANDLORD, IF ANY. Tenant shall provide such supplemental security services and shall install within the Premises such supplemental security equipment, systems and procedures as may reasonably be required for the protection of its employees and invitees, provided that Tenant shall coordinate such services and equipment with any security provided by Landlord. The determination of the extent to which such supplemental security equipment, systems and procedures are reasonably required shall be made in the sole judgment, and shall be the sole responsibility, of Tenant. Tenant acknowledges that it has neither received nor relied upon any representation or warranty made by or on behalf of Landlord with respect to the safety or security of the Premises or the Project or any part thereof or the extent or effectiveness of any security measures or procedures now or hereafter provided by Landlord, and further acknowledges that Tenant has made its own independent determinations with respect to all such matters.

  • Control Areas Tenant shall be allowed to utilize up to its pro rata share of the Hazardous Materials inventory within any control area or zone (located within the Premises), as designated by the applicable building code, for chemical use or storage. As used in the preceding sentence, Tenant’s pro rata share of any control areas or zones located within the Premises shall be determined based on the rentable square footage that Tenant leases within the applicable control area or zone. For purposes of example only, if a control area or zone contains 10,000 rentable square feet and 2,000 rentable square feet of a tenant’s premises are located within such control area or zone (while such premises as a whole contains 5,000 rentable square feet), the applicable tenant’s pro rata share of such control area would be 20%.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Site Access The Buyer agrees to RELEASE, INDEMNIFY AND HOLD HARMLESS the Seller Indemnitees from and against the entirety of any Adverse Consequences that are suffered by the Seller Indemnitees arising out of, resulting from or relating to any field visit or other due diligence activities relating to any performance of the Diligence Activities to the extent caused by acts or omissions of any Buyer Party or Buyer Diligence Representative, even if such Adverse Consequences arise out of or result from, solely or in part, the sole, active, passive, concurrent or comparative negligence, strict liability or other fault or violation of Law of or by the Seller Indemnitees, except Adverse Consequences to the extent resulting from the gross negligence or willful misconduct of the Seller Indemnitees.

  • HORIZONR Gateway HORIZONR Gateway provides customers with the ability to (i) generate reports using information maintained on the Multicurrency HORIZONR Accounting System which may be viewed or printed at the customer’s location; (ii) extract and download data from the Multicurrency HORIZONR Accounting System; and (iii) access previous day and historical data. The following information which may be accessed for these purposes: 1) holdings; 2) holdings pricing; 3) transactions, 4) open trades; 5) income; 6) general ledger and 7) cash.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Clean-Up Period (a) Notwithstanding any other provision of any Finance Document:

  • Underground Tanks If underground or other storage tanks storing Hazardous Materials located on the Premises or the Project are used by Tenant or are hereafter placed on the Premises or the Project by Tenant, Tenant shall install, use, monitor, operate, maintain, upgrade and manage such storage tanks, maintain appropriate records, obtain and maintain appropriate insurance, implement reporting procedures, properly close any underground storage tanks, and take or cause to be taken all other actions necessary or required under applicable state and federal Legal Requirements, as such now exists or may hereafter be adopted or amended in connection with the installation, use, maintenance, management, operation, upgrading and closure of such storage tanks.

Time is Money Join Law Insider Premium to draft better contracts faster.