WHO IS SERVED Sample Clauses

WHO IS SERVED. (Describe whether services are to be provided directly to students, to staff, etc.) The target population is for accelerated 9th grade students and students in grades 10 – 12, who are underserved and highly motivated but have not necessarily received the academic preparation needed for a smooth transition into post-secondary education and who are enrolled in the Roosevelt High School Early College Studies Program.
AutoNDA by SimpleDocs
WHO IS SERVED. (Describe whether services are to be provided directly to students, to staff, etc.) Staff in the Department of Research, Evaluation and Reporting, PowerSchool
WHO IS SERVED. The course will be offered to the students enrolled at GHS-ECSSP in the dual credit courses offered on their full time high school schedule. Students who will be enrolled in the courses will be selected by the high school designated representative and by students who have enrolled in the ECSSP as early as their freshman year of high school.
WHO IS SERVED. As noted above, services will be provided for up to four individuals who must be parents of currently enrolled students at Roosevelt High School’s Early College Studies program within the Yonkers Public School System. Services will be provided by The College of Westchester. As with the College’s current operational procedures, the quality of this program will be judged by the Standards of Academic Progress maintained by the participants, by the persistence and retention of participants in the program, and by the successful completion of the course of study by the participants.
WHO IS SERVED. As noted above, services will be provided for up to four individuals who must be parents of currently enrolled students at Roosevelt High School’s Early College Studies program within the Yonkers Public School System. Services will be provided by The College of Westchester. College of Westchester will report to Dr. Xxx X’Xxx the progress of each participant in the program. At the end of the term a summary of the progress will be reported to Dr. Xxx D’Ugo. (liaison at Xxxxxxxxx XX to College of Westchester) As with the College’s current operational procedures, the quality of this program will be judged by the Standards of Academic Progress maintained by the participants, by the persistence and retention of participants in the program, and by the successful completion of the course of study by the participants.

Related to WHO IS SERVED

  • Unbundled Network Terminating Wire (UNTW) 2.8.3.1 UNTW is unshielded twisted copper wiring that is used to extend circuits from an intra-building network cable terminal or from a building entrance terminal to an individual End User’s point of demarcation. It is the final portion of the Loop that in multi-subscriber configurations represents the point at which the network branches out to serve individual subscribers. 2.8.3.2 This element will be provided in MDUs and/or Multi-Tenants Units (MTUs) where either Party owns wiring all the way to the End User’s premises. Neither Party will provide this element in locations where the property owner provides its own wiring to the End User’s premises, where a third party owns the wiring to the End User’s premises.

  • Consultants’ Services All consultants’ services required for the Project and to be financed out of the proceeds of the Financing shall be procured in accordance with the requirements set forth or referred to in Sections I and IV of the Consultant Guidelines, and with the provisions of this Section.

  • Forfeiture upon Termination of Status as a Service Provider Notwithstanding any contrary provision of this Award Agreement, the balance of the Restricted Stock Units that have not vested as of the time of Participant’s termination as a Service Provider for any or no reason and Participant’s right to acquire any Shares hereunder will immediately terminate.

  • Other Methods of Procurement of Consultants’ Services The following table specifies the methods of procurement, other than Quality and Cost-based Selection, which may be used for consultants’ services. The Procurement Plan shall specify the circumstances under which such methods may be used. (a) Quality-based Selection (b) Selection under a Fixed Budget

  • Non-Medical, Personalized Services The Practice shall also provide Members with the following non-medical services:

  • SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.

  • Particular Methods of Procurement of Consultants’ Services 1. Quality- and Cost-based Selection. Except as otherwise provided in paragraph 2 below, consultants’ services shall be procured under contracts awarded on the basis of Quality and Cost-based Selection.

  • The Advisers Services (a) DISCRETIONARY INVESTMENT MANAGEMENT SERVICES. The Adviser shall act as investment adviser with respect to the Funds. In such capacity, the Adviser shall, subject to the supervision of the Board, regularly provide the Funds with investment research, advice and supervision and shall furnish continuously an investment program for the Funds, consistent with the respective investment objectives and policies of each Fund. The Adviser shall determine, from time to time, what securities shall be purchased for the Funds, what securities shall be held or sold by the Funds and what portion of the Funds' assets shall be held uninvested in cash, subject always to the provisions of the Trust's Agreement and Declaration of Trust, By-Laws and its registration statement on Form N-1A (the "Registration Statement") under the 1940 Act, and under the Securities Act of 1933, as amended (the "1933 Act"), covering Fund shares, as filed with the Securities and Exchange Commission (the "Commission"), and to the investment objectives, policies and restrictions of the Funds, as each of the same shall be from time to time in effect. To carry out such obligations, the Adviser shall exercise full discretion and act for the Funds in the same manner and with the same force and effect as the Funds themselves might or could do with respect to purchases, sales or other transactions, as well as with respect to all other such things necessary or incidental to the furtherance or conduct of such purchases, sales or other transactions. No reference in this Agreement to the Adviser having full discretionary authority over each Fund's investments shall in any way limit the right of the Board, in its sole discretion, to establish or revise policies in connection with the management of a Fund's assets or to otherwise exercise its right to control the overall management of a Fund.

  • Preservation of Business The Seller will keep its business and properties substantially intact, including its present operations, physical facilities, working conditions, and relationships with lessors, licensors, suppliers, customers, and employees.

  • Continuation of Business Neither the Transfer of any Partnership Interest pursuant to Article 8 hereof nor the bankruptcy or withdrawal of a Partner shall cause the dissolution or termination of the Partnership or have any effect upon the continuance of the Partnership business. No Partner shall have a right to withdraw from the Partnership or to abandon any Partnership Interest.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!