Intermediaries a. Subject to Clause 15 if either party uses the services of an intermediary to transmit, log, store or process Messages, that party shall be responsible for any acts, failures or omissions by that intermediary in its provision of the said services as though they were his own acts, failures or omissions. The Authority shall be liable as between the Authority and the Contractor for any acts, failures or omissions of DECS in its provision of the services of an intermediary as though they were the acts, failures or omissions of the Authority. b. Any party using an intermediary shall ensure that it is a contractual responsibility of the intermediary that no change in the substantive data content of the Messages to be transmitted is made and that such Messages are not disclosed to any unauthorised person.
Controls Each party will maintain commercially reasonable administrative, technical, and physical controls designed to protect data in its possession or under its control from unauthorised access, accidental loss and unauthorised modification. You are responsible for implementing administrative, technical, and physical controls that are appropriate for your business.
Use of Third Parties Except as may be expressly agreed to in writing by the State Entity, Contractor shall not subcontract, assign, delegate or otherwise permit anyone other than Contractor or Contractor's personnel to perform any of Contractor's obligations under this Contract or any of the work subsequently assigned under this Contract. No subcontract which Contractor enters into with respect to performance of obligations or work assigned under the Contract shall in any way relieve Contractor of any responsibility, obligation or liability under this Contract and for the acts and omissions of all subcontractors, agents, and employees. All restrictions, obligations and responsibilities of the Contractor under the Contract shall also apply to the subcontractors. Any contract with a subcontractor must also preserve the rights of the State Entity. The State Entity shall have the right to request the removal of a subcontractor from the Contract for good cause.
WILD AND SCENIC RIVERS The Wild and Scenic Rivers Act of 1968 (16 U.S.C. § 1271, et seq.) as amended, particularly sections 7(b) and (c) (16 U.S.C. § 1278(b) and (c)). AIR QUALITY The Clean Air Act (42 U.S.C. § 7401, et seq.) as amended, particularly sections 176(c) and (d) (42 U.S.C. §7506(c) and (d)). Determining Conformity of Federal Actions to State or Federal Implementation Plans (Environmental Protection Agency-40 C.F.R. Parts 6, 51, and 93).
Misuse of TINs If the requester discloses or uses TINs in violation of federal law, the requester may be subject to civil and criminal penalties. Specific Instructions Line 1
Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.
CONFLICTS WITH TRUST’S GOVERNING DOCUMENTS AND APPLICABLE LAWS Nothing herein contained shall be deemed to require the Trust or any Fund to take any action contrary to the Trust’s Agreement and Declaration of Trust, Amended and Restated By-Laws, or any applicable statute or regulation, or to relieve or deprive the Board of Trustees of its responsibility for and control of the conduct of the affairs of the Trust and Fund. In this connection, the Adviser acknowledges that the Trustees retain ultimate plenary authority over each Fund and may take any and all actions necessary and reasonable to protect the interests of shareholders.
Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors. (b) If the employer decides to engage subcontractors, the employer shall ensure that these contractors and their employees receive wages, allowances and conditions equal to or better than those contained in this agreement. (c) The use of sham sub contracting arrangements is a breach of this agreement. The contractor who engages subcontractors is responsible for ensuring the employees of sub- contractors receive wages, allowances and conditions equal to or better those contained in this agreement, this obligation extends to liability for all outstanding wages conditions and entitlements under this agreement.
Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.
USE BY OTHER FEDERAL AGENCIES The rates in this Agreement were approved in accordance with the authority in Title 2 of the Code of Federal Regulations, Part 200 (2 CFR 200), and should be applied to grants, contracts and other agreements covered by 2 CFR 200, subject to any limitations in A above. The organization may provide copies of the Agreement to other Federal Agencies to give them early notification of the Agreement.