Use of Ranking Tools Sample Clauses

Use of Ranking Tools. Risk ranking, using tools that rely on knowledge of risk factors to rank risks and prioritize regulatory controls, is often commissioned by risk managers (given below). Such rankings may or may not be based on risk assessments. Some tools categorize a food business against specified risk factors, e.g. by type of food, type of food preparation, type of business, compliance record, and food user sub-population. • The Business Food Safety Classification Tool developed by the Australian Government Department of Health and Aging is a software programme that incorporates a decision tree to assess the potential public health risk from different types of food businesses and food producers. This tool identifies those food industry sectors/businesses that are candidates for priority regulatory control and verification. Risk AnalysisThe Risk Categorizing Model for Food Retail/Food Service Establishments developed by the Canadian Federal Provincial Territorial Food Safety Policy Committee categorizes food establishments so that the competent authority can give greater attention to those where a failure of regulatory controls would cause the greatest potential risks to consumers. • The Food Safety Research Consortium in the United States is developing a model to produce rankings by pathogens, by food, and by pathogen/food combination, using five criteria for ranking impact on public health: number of cases of illness, number of hospitalizations, number of deaths, monetary valuations of health outcomes, and loss of Quality Adjusted Life Years. • The National Institute for Public Health and the Environment in the Netherlands applied a quantitative methodology (developed by WHO) to calculate disease burden using Disability Adjusted Life Years and cost-of- illness in monetary terms in order to assist risk managers in prioritizing regulatory activities according to pathogen. • Risk Ranger, a software programme developed at the University of Hobart, Australia, extends the above risk ranking tools to allow risk ranking of hazard-food combinations in national settings. Categories used in the tool include rankings for hazard severity and susceptibility of the consumer, probability of exposure to the food and probability of the food containing an infectious dose. Comparative risk in the population of interest is expressed as a relative ranking between zero and 100. Other tools are used to rank hazard-food combinations in a national context by deriving a “comparative risk” sco...
AutoNDA by SimpleDocs

Related to Use of Ranking Tools

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.

  • Use of Customer Name Contractor may use County’s name without County’s prior written consent only in Contractor’s customer lists. Any other use of County’s name by Contractor must have the prior written consent of County.

  • Use of Logos The Company hereby consents to the use of its and its Subsidiaries’ logos in connection with the Debt Financing so long as such logos (i) are used solely in a manner that is not intended to or likely to harm or disparage the Company Group or the reputation or goodwill of the Company Group; (ii) are used solely in connection with a description of the Company, its business and products or the Merger; and (iii) are used in a manner consistent with the other terms and conditions that the Company reasonably imposes.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords. 5.2 We may enlist outside organizations to help us manage the website and collect and analyze statistical data. These outside organizations may install and use their own cookies on our behalf.

  • Use of websites (a) The Guarantor may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Guarantor and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Guarantor shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Guarantor and the Administrative Agent. (c) The Guarantor shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Guaranty is posted onto the Designated Website; (iv) any existing information which has been provided under this Guaranty and posted onto the Designated Website is amended; or (v) the Guarantor becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Guarantor notifies the Administrative Agent under Section 8.3(c)(i) or Section 8.3(c)(v) above, all information to be provided by the Guarantor under this Guaranty after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.

  • Use of Defined Terms Unless otherwise defined or the context otherwise requires, terms for which meanings are provided in this Agreement shall have such meanings when used in each other Loan Document and the Disclosure Schedule.

  • Use of Name (a) The Sub-Adviser hereby consents to the use of its name and the names of its affiliates in the Fund’s disclosure documents, shareholder communications, advertising, sales literature and similar communications. The Sub-Adviser shall not use the name or any tradename, trademark, trade device, service xxxx, symbol or any abbreviation, contraction or simulation thereof of the Adviser, the Trust, the Fund or any of their affiliates in its marketing materials unless it first receives prior written approval of the Trust and the Adviser. (b) It is understood that the name of each party to this Agreement, and any derivatives thereof or logos associated with that name, is the valuable property of the party in question and its affiliates, and that each other party has the right to use such names pursuant to the relationship created by, and in accordance with the terms of, this Agreement only so long as this Agreement shall continue in effect. Upon termination of this Agreement, the parties shall forthwith cease to use the names of the other parties (or any derivative or logo) as appropriate and to the extent that continued use is not required by applicable laws, rules and regulations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!