The MIC Policy and Land Use Sample Clauses

The MIC Policy and Land Use. Study shall include recommendations to the City Council and Mayor for new land use regulatory changes to implement the goals and purposes of this Section and shall be completed no later than December 31, 2014.
AutoNDA by SimpleDocs

Related to The MIC Policy and Land Use

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Energy Policy and Conservation Act Both parties hereby agree to comply with all mandatory standards and policies relating to energy efficiency, which are contained in the state energy conservation plan issued in compliance with the Energy Policy and Conservation Act (Pub. L. 94-163, 89 Stat. 871).

  • Certification of Compliance with the Energy Policy and Conservation Act When appropriate and to the extent consistent with the law, Vendor certifies that it will comply with the Energy Policy and Conservation Act (42 U.S.C. 6321 et seq; 49 C.F.R. Part 18) and any mandatory standards and policies relating to energy efficiency which are contained in applicable state energy conservation plans issued in compliance with the Act. Does Vendor agree? Yes

  • COMPLIANCE WITH ENERGY POLICY AND CONSERVATION ACT Contractor certifies that Contractor will be in compliance with mandatory standards and policies relating to energy efficiency which are contained in the state energy conservation plan issued in compliance with the Energy Policy and Conservation Act (Pub. L. 94-163, 89 Stat. 871). Attachment A Xxxxxx Equipment Company Sewer Cleaning, Hydro-Excavating, Inspection Equipment and Miscellaneous Services Contract No. SC01-21A H-GAC PRODUCT ITEM BASE OFFERING PRICES H-GAC Product Code Description Base Offered Price Envirosight

  • ENERGY POLICY AND CONSERVATION ACT COMPLIANCE To the extent applicable, Supplier must comply with the mandatory standards and policies relating to energy efficiency which are contained in the state energy conservation plan issued in compliance with the Energy Policy and Conservation Act.

  • COMPLIANCE WITH HEALTH, SAFETY, AND ENVIRONMENTAL REGULATIONS The Contractor, it’s Subcontractors, and their respective employees, shall comply fully with all applicable federal, state, and local health, safety, and environmental laws, ordinances, rules and regulations in the performance of the services, including but not limited to those promulgated by the City and by the Occupational Safety and Health Administration (OSHA). In case of conflict, the most stringent safety requirement shall govern. The Contractor shall indemnify and hold the City harmless from and against all claims, demands, suits, actions, judgments, fines, penalties and liability of every kind arising from the breach of the Contractor’s obligations under this paragraph.

  • Compliance with Laws, Rules and Regulations a. Assurances. The Contractor agrees that all activity pursuant to this Contract will be in accordance with all applicable current federal, state and local laws, rules, and regulations, including but not limited to the Public Records Act (chapter 42.56 RCW), the Freedom of Information Act (5 U.S.C. 522) and the Records Retention Act (chapter 40.14 RCW).

  • Compliance with Rules and Regulations PFPC undertakes to comply with all applicable requirements of the Securities Laws and any laws, rules and regulations of governmental authorities having jurisdiction with respect to the duties to be performed by PFPC hereunder. Except as specifically set forth herein, PFPC assumes no responsibility for such compliance by the Fund or any other entity.

  • Policy and Procedure The school seeks to ensure that internet, mobile and digital technologies are used effectively and safely, for their intended educational purpose, in ways that will not infringe legal requirements or create unnecessary risk. The school expects everyone to use internet, mobile and digital technologies responsibly and strictly according to the conditions set out in this policy. This policy also includes expectations on appropriate online behaviour and use of technology outside of school for pupils, parents/carers, staff and governors and all other visitors to the school. Use of email Staff and governors should use a school email account or Governor Hub for all official school communication to ensure everyone is protected through the traceability of communication. Under no circumstances should staff contact pupils, parents or conduct any school business using a personal email address. Pupils should use school approved accounts on the school system for educational purposes. Where required parent/carer permission will be obtained for the pupil account to exist. For advice on emailing, sharing personal or confidential information or the need to gain parent permission refer to the policy for GDPR. Emails created or received as part of any school role will be subject to disclosure in response to a request for information under the Freedom of Information Act 2000. Staff, governors and pupils should not open emails or attachments from suspect sources and should report their receipt to Xxxx Xxxxxxxxxxx, our IT Technician, for advice. Users must not send emails which are offensive, embarrassing or upsetting to anyone (i.e. cyberbullying). Visiting online sites and downloading • Staff must preview sites, software and apps before their use in school or before recommending them to pupils. Before using any online service that requires user accounts to be created or the sharing of any personal data, staff must consult with Xxxx Xxxxxxxxxxx, the Data Protection Officer, with details of the site/service and seek approval from a senior leader. The terms and conditions of the service should be read and adhered to, and parental/carer permission sought where required. If internet research is set for homework, specific sites will be suggested that have been checked by the teacher. All users must observe copyright of materials from electronic sources. • Staff must only use pre-approved systems if creating blogs, wikis or other online content. • When working with pupils searching for images should be done through Google Safe Search (standard through the HICS service), Google Advanced Search or a similar application that provides greater safety than a standard search engine. Users must not: Visit internet sites, make, post, download , upload or pass on, material, remarks, proposals or comments that contain or relate to: • Indecent images of children actually or apparently under the age of 18 or images of child abuse (i.e. images of children, digital or cartoons, involved in sexual activity or posed to be sexually provocative) • Indecent images of vulnerable people over the age of 18 (i.e. images of vulnerable people, digital or cartoons involved in sexual activity or posed to be sexually provocative) • Adult material that breaches the Obscene Publications Act in the UK • Promoting discrimination of any kind in relation to the protected characteristics: age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race or ethnicity, religion or belief, sex, sexual orientation • Promoting hatred against any individual or group from the protected characteristics above • Promoting illegal acts including physical or sexual abuse of children or adults, violence, bomb making, drug and alcohol abuse and software piracy • Any material that may bring the school or any individual within it into disrepute e.g. promotion of violence, gambling, libel and disrespect Users must not: • Reveal or publicise confidential or proprietary information • Intentionally interfere with the normal operation of the internet connection, including the propagation of computer viruses • Transmit unsolicited commercial or advertising material either to other users, or to organisations connected to other networks except where permission has been given to the school • Use the school's hardware and Wi-Fi facilities for running a private business • Intimidate, threaten or cause harm to others • Access or interfere in any way with other users' accounts • Use software or hardware that has been prohibited by the school Only a school device may be used to conduct school business outside of school. The only exception would be where a closed, monitorable system has been set up by the school for use on a personal device. Such a system would ensure the user was not saving files locally to their own device and breaching data security. A monitorable system would be one such as LARA. Through LARA, any school documents accessed on a personal device are never actually on the computer being used, they remain on the school server. When the user logs-out of XXXX, there are no copies left on their own device All breaches of prohibited behaviours detailed above will be investigated, where appropriate, in liaison with the police. The school recognises that in certain planned curricular activities, access to controversial and/or offensive online content may be beneficial for educational use. In such circumstances, there is an expectation that access is pre-planned, risk assessed and recorded, and permission given by the Headteacher.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!