Tidegate and Floodgate Maintenance Species Impact Analysis Sample Clauses

Tidegate and Floodgate Maintenance Species Impact Analysis. The potential for fish to be impacted from tidegate and floodgate maintenance increases with the degree to which the watercourse or shoreline is disturbed, and the degree to which motorized equipment is used to complete the maintenance. Minor repairs have a very low potential to impact fish, whereas major repairs or replacement tend to have increasingly greater potential to impact fish. The potential for fish to be impacted by tidegate and floodgate maintenance is also related to the size of fish. Larger fish are stronger swimmers and therefore better able to escape and avoid the potential impacts of maintenance activities, whereas smaller fish are weaker swimmers and therefore at greater risk of being killed or injured. The potential for fish to be impacted is greater in those habitats where small fish rear and seek refuge. The habitats typically associated with tidegates and floodgates in the Skagit delta and estuary provide optimal rearing and refuge habitat for smaller fish, whereas larger fish tend to seek optimal rearing and refuge conditions in deeper water and offshore habitats. The potential for fish to be impacted is also dependent upon small fish being present at the tidegate or floodgate sites. For many fish species, dependence on delta and estuary habitats is seasonal. The time of the year when juvenile fish utilize the delta and estuary habitats for rearing and refuge is different for different fish species and life histories. For salmonid species, small juveniles typically depend on the Skagit delta and estuary habitats between February 1 and July 31 during which time they are at greatest risk of being impacted by tidegate and floodgate maintenance. Tidegate and floodgate maintenance activities can result in direct and indirect impacts to fish. Direct impacts include physical and/or chemical trauma to the fish that can result in injury or death. Indirect impacts are temporary and do not directly kill or injure the fish. Indirect maintenance impacts disturb and/or alter the watercourse and shoreline habitats upon which fish depend for rearing and refuge thus compromising their rearing ability and their potential to survive. The following conditions could result in direct maintenance impacts: • Whenever a watercourse is excavated with motorized equipment, fish can be killed or injured. Fish can be physically removed from the watercourse in the bucket of the excavator and discarded on the shoreline. The excavator bucket can also physically inju...
AutoNDA by SimpleDocs

Related to Tidegate and Floodgate Maintenance Species Impact Analysis

  • Account Maintenance Trade Allocations Trade Reporting; (Futures) Daily Trade Checkout Daily Statement Reconciliation

  • Support and Maintenance Services Information about Teradici’s support and maintenance for the Licensed Product may be found at xxxxx://xxxx.xxxxxxxx.xxx.

  • Project Number The project number has been assigned by the Commission as the unique identifier for your project, and it cannot be changed. The project number should appear on each page of the grant agreement preparation documents to prevent errors during its handling.

  • Operation and Maintenance Manuals Receipts for transmittal of Operation and Maintenance Manuals, Brochures and Data to the Design Professional (or Commissioning Agent) as required by Section 6.1.1.5.

  • Support and Maintenance Where Licensee purchases support and/or maintenance services, Licensee’s initial support and/or maintenance term will begin upon delivery to Licensee of the Licensed Software and continue for one (1) year thereafter (or the length of the term if less than a year for any subscription/term license) unless otherwise specified in the applicable annual support and/or maintenance agreement, Product Order, or other written agreement executed between Licensor and Licensee. Where Licensee purchases support and/or maintenance for any Licensed Software, Licensee hereby agrees that it shall purchase such support and/or maintenance services for all of Licensee’s licensed units of such Licensed Software product. Support and/or maintenance services provided by Licensor will be subject to Licensor’s then current applicable standard annual support and/or maintenance agreement unless otherwise agreed by the parties in writing.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Management of Special and Technical Environment Each certificated support person demonstrates an acceptable level of performance in managing and organizing the special materials, equipment and environment essential to the specialized programs.

  • Electrical appliance safety The Hirer shall ensure that any electrical appliances brought by them to the premises and used there shall be safe, in good working order, and used in a safe manner in accordance with the Electricity at Work Regulations 1989. Where a residual circuit breaker is provided the hirer must make use of it in the interests of public safety.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Records Maintenance and Access Grantee must maintain all financial records relating to this Grant in accordance with generally accepted accounting principles. In addition, Grantee must maintain any other records, whether in paper, electronic or other form, pertinent to this Grant in such a manner as to clearly document Grantee’s performance. All financial records and other records, whether in paper, electronic or other form, that are pertinent to this Grant, are collectively referred to as “Records.” Grantee acknowledges and agrees Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to all Records to perform examinations and audits and make excerpts and transcripts. Grantee must retain and keep accessible all Records for a minimum of six (6) years, or such longer period as may be required by applicable law, following termination of this Grant, or until the conclusion of any audit, controversy or litigation arising out of or related to this Grant, whichever date is later.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!