XXXXXX AND HOUSEKEEPING Sample Clauses

XXXXXX AND HOUSEKEEPING. PRASA operate stations within a strict railway-operating environment with high commuter flow, particularly during operating peak periods. Safety of commuters is therefore a non-negotiable requirement and the following should be strictly complied with. • The Contractor shall submit a Health & Safety Plan 2 weeks before commencement, which will include Risk Assessment with proposed work method and request for approval for site access (for PRASA CRES’s approval). Only when approval is granted shall the Contractor be granted access to the site for the duration of the contract. Please refer to the attached Contractor Safety Checklist. • Good safety and housekeeping practices shall be entrenched in working methods and practices. • Compliance with Environmental, Health and Safety Regulations as well as any such regulation prescribed by PRASA. It is the Contractors responsibility to know and understand them properly. • Regular and routine or ad-hoc inspections of compliance with safety and housekeeping shall be undertaken and all necessary correction actions immediately implemented.
AutoNDA by SimpleDocs

Related to XXXXXX AND HOUSEKEEPING

  • Health and hygiene The Hirer shall, if preparing, serving or selling food, observe all relevant food health and hygiene legislation and regulations. In particular dairy products, vegetables and meat on the premises must be refrigerated and stored in compliance with the Food Temperature Regulations. The premises are provided with a refrigerator and thermometer.

  • FLOODPLAIN MANAGEMENT AND WETLAND PROTECTION Executive Order 11988, Floodplain Management, May 24, 1977 (42 FR 26951), 3 C.F.R., 1977 Comp., p. 117, as interpreted in HUD regulations at 24 C.F.R. Part 55, particularly Section 2(a) of the Order (For an explanation of the relationship between the decision- making process in 24 C.F.R. Part 55 and this part, see § 55.10.); and Executive Order 11990, Protection of Wetlands, May 24, 1977 (42 FR 26961), 3 C.F.R., 1977 Comp., p. 121 particularly Sections 2 and 5. COASTAL ZONE MANAGEMENT The Coastal Zone Management Act of 1972 (16 U.S.C. § 1451, et seq.), as amended, particularly sections 307(c) and (d) (16 U.S.C. § 1456(c) and (d)).

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Xxxxxxxx and X X. Xxxxx. 1930. Checklist of the fishes and fishlike vertebrates of North and Middle America north of the northern boundary of Venezuela and Columbia. Rept. U.S. Fish Comm. 1928(2):1-670. Jordan, D.S. and X.X. Xxxxxxxx. 1896. The fishes of North and Middle America. Part 1. U.S. Natl. Mus. Bul. 47:1-1240. Xxxxx, S. and X. Xxxxxx. 2005..Hydrogeologic setting of the snake valley hydrologic basin, Xxxxxxx County, Utah, and White Pine and Lincoln Counties, Nevada – implications for possible effects of proposed water xxxxx. Report of investigation 254, Utah Geological Survey. Xxxxxxx, M.C. 1982. Status report of three Bonneville basin endemic fishes. Prepared for the U.S. Fish and Wildlife Service. 27 pp. May, B. E. and X. X. Xxxxx. 1981. Comparative effects of sheep and cattle grazing on the Xxxxx Creek drainage. Transactions of the Bonneville Chapter American Fisheries Society. 1981:48-62. Xxxxx, X.X. 1985. Predation and species replacement in American Southwestern fishes: a case study. Southwestern Naturalist. 30:173-187. Xxxxxx, X. X. and X. X. Xxxxxx. 1985. Two New Intergeneric Cyprinid Hybrids from the Bonneville Basin, Utah. Copeia, 1985(2):509-515. Xxxxxx, X.X. 1972. Threatened freshwater fishes of the United States. Trans. Amer, Fish. Soc. 101(2):239-252.

  • Stormwater Management The Owner agrees that stormwater management measures shall be applicable to the development of the Lands, in a manner which is in accordance with the provisions of The Drainage Act, R.S.O. 1990, c.D.17 and amendments thereto, and to the satisfaction of the Municipality's Engineer.

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Xxxxxxxxx and X Xxxxxxx. A

  • Telephone Monitoring and Recording You consent to and authorize us and any of our affiliates, agents and marketing associates to monitor and/or record any of your telephone conversations with any of our or their representatives for quality control, training and other lawful purposes.

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section.

Time is Money Join Law Insider Premium to draft better contracts faster.