Public Outreach The Sponsor is responsible for development and administration of a public outreach effort to ensure public awareness and involvement in the Project development and delivery process. The Sponsor shall provide a copy of the public outreach plan and all materials documenting the public outreach activities, including public notices, press releases, flyers, etc. to the Authority. The public outreach plan must accompany the first invoice for payment from Sponsor. The materials documenting the public outreach activities must accompany the final invoice for payment from Sponsor.
Outreach Not less than 30 days prior to the opening of bids or the selection of contractors, the Agency-Assisted Contractor or Contractor shall:
CULTURAL DIVERSITY The Cultural Diversity Requirement generally does not add units to a student's program. Rather, it is intended to be fulfilled by choosing courses from the approved list that also satisfy requirements in other areas of the student’s program; the exception is that Cultural Diversity courses may not satisfy Culture and Language Requirements for B.S. students. For example, COMM 6 – Intercultural Communication, can fulfill (3) units of the Behavioral Science requirement and (3) units of the Cultural Diversity requirement. This double counting of a class may only be done with the Cultural Diversity requirement. Courses in Cultural Diversity may be taken at the lower- division or upper-division level.
Community Outreach Please describe all community outreach efforts undertaken since the last report.
Utilization Management Contractor shall maintain a utilization management program that complies with applicable laws, rules and regulations, including Health and Safety Code § 1367.01 and other requirements established by the applicable State Regulators responsible for oversight of Contractor.
MANAGEMENT OF EVALUATION OUTCOMES 12.1 Where the Employer is, any time during the Employee’s employment, not satisfied with the Employee’s performance with respect to any matter dealt with in this Agreement, the Employer will give notice to the Employee to attend a meeting; 12.2 The Employee will have the opportunity at the meeting to satisfy the Employer of the measures being taken to ensure that his performance becomes satisfactory and any programme, including any dates, for implementing these measures; 12.3 Where there is a dispute or difference as to the performance of the Employee under this Agreement, the Parties will confer with a view to resolving the dispute or difference; and 12.4 In the case of unacceptable performance, the Employer shall – 12.4.1 Provide systematic remedial or developmental support to assist the Employee to improve his performance; and 12.4.2 After appropriate performance counselling and having provided the necessary guidance and/or support as well as reasonable time for improvement in performance, the Employer may consider steps to terminate the contract of employment of the Employee on grounds of unfitness or incapacity to carry out his or her duties.
Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.
Public Procurement The Parties shall cooperate to develop conditions for open and competitive award of contracts for goods and services in particular through calls for tenders.
Tourism In this field, the objective of the cooperation will be to strengthen the promotion of the tourist potentialities of the Parties, as well as to facilitate the information exchange and the conservation of natural and cultural attractions.
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.