The assessment of the Commission shall be published Sample Clauses

The assessment of the Commission shall be published. Member States may discuss the progress report in their national parliaments and with civil society, social partners and relevant stakeholders, in accordance with their national legal frameworks.
AutoNDA by SimpleDocs

Related to The assessment of the Commission shall be published

  • State of California Public Liability and Workers’ Compensation Program A. The Judicial Council has elected to be self-insured for its motor vehicle, aircraft liability and general liability exposures. B. The Judicial Council administers workers’ compensation benefits for its employees through a Third Party agreement.

  • Laws Applicable to Construction The interpretation, performance and enforcement of this Agreement shall be governed by the laws of the State of Delaware as applied to contracts executed in and performed wholly within the State of Delaware, without reference to principles of conflict of laws.

  • Certification of Meeting or Exceeding Tobacco-Free Workplace Policy Minimum Standards A. Grantee certifies that it has adopted and enforces a Tobacco-Free Workplace Policy that meets or exceeds all of the following minimum standards of: i. Prohibiting the use of all forms of tobacco products, including but not limited to cigarettes, cigars, pipes, water pipes (hookah), bidis, kreteks, electronic cigarettes, smokeless tobacco, snuff and chewing tobacco; ii. Designating the property to which this Policy applies as a "designated area,” which must at least comprise all buildings and structures where activities funded under this Grant Agreement are taking place, as well as Grantee owned, leased, or controlled sidewalks, parking lots, walkways, and attached parking structures immediately adjacent to this designated area; iii. Applying to all employees and visitors in this designated area; and iv. Providing for or referring its employees to tobacco use cessation services. B. If Grantee cannot meet these minimum standards, it must obtain a waiver from the System Agency.

  • No Governmental Review Such Buyer understands that no United States federal or state agency or any other government or governmental agency has passed on or made any recommendation or endorsement of the Securities or the fairness or suitability of the investment in the Securities nor have such authorities passed upon or endorsed the merits of the offering of the Securities.

  • Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.

  • COMPLIANCE WITH HEALTH, SAFETY, AND ENVIRONMENTAL REGULATIONS The Contractor, it’s Subcontractors, and their respective employees, shall comply fully with all applicable federal, state, and local health, safety, and environmental laws, ordinances, rules and regulations in the performance of the services, including but not limited to those promulgated by the City and by the Occupational Safety and Health Administration (OSHA). In case of conflict, the most stringent safety requirement shall govern. The Contractor shall indemnify and hold the City harmless from and against all claims, demands, suits, actions, judgments, fines, penalties and liability of every kind arising from the breach of the Contractor’s obligations under this paragraph.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Laws Applicable to Construction; Consent to Jurisdiction The interpretation, performance and enforcement of this Agreement shall be governed by the laws of the State of Delaware without reference to principles of conflict of laws, as applied to contracts executed in and performed wholly within the State of Delaware. In addition to the terms and conditions set forth in this Agreement, the Restricted Stock Units are subject to the terms and conditions of the Plan, which is hereby incorporated by reference.

  • COMPLIANCE WITH GOVERNMENTAL RULES AND REGULATIONS; RECORDS The Trust assumes full responsibility for its compliance with all securities, tax, commodities and other laws, rules and regulations applicable to it.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!