Xxxxxxx Slough Navigation Flow Requirements Under Federal Law Sample Clauses

Xxxxxxx Slough Navigation Flow Requirements Under Federal Law. The NMFS BiOp requires the development of certain recommendations regarding the Xxxxxxx Slough navigation flow requirements. Reclamation’s compliance with the Xxxxxxx Slough 5,000 cfs navigation flow standard, however, is not discretionary. In this regard, Congress initially authorized the construction of certain facilities for the Central Valley Project (“CVP”) under the Rivers and Harbors Act of 1935 (the “1935 Act”). (49 Stat. 1028, 1038). The 1935 Act mandated in relevant part that “the following works of improvement of rivers . . . are hereby adopted and authorized . . . in accordance with the plans recommended in the respective reports hereinafter designated and subject to the conditions set forth in such documents . . . Sacramento River, California; Rivers and Harbors Committee Document Numbered 35, Seventy-third Congress . . . .” (50 Stat. 1028, 1038.) As such, the 1935 Act incorporates by reference, and expressly requires the implementation of, the recommendations of the Rivers and Harbors Committee Document Number 35. This document is a 1934 report from the Corps’ Chief Engineer recommending to Congress that Xxxxxxx Dam (predecessor to Shasta Dam) “shall be operated so as to provide a minimum flow of 5,000 cubic feet per second between Chico Landing and Sacramento.” (See Central Valley Project Documents, Part I, 544, 548 [Committee Doc. 35, 73rd Cong.].) Congress re-authorized the CVP under the Rivers and Harbors Act of 1937 (the “1937 Act”). (50 Stat. 844, 850.)1 This re-authorization mandated in relevant part that “the $12,000,000 recommended for expenditure for a part of the Central Valley project, California, in accordance with the plans set forth in Rivers and Harbors Committee Document Numbered 35, Seventy-third Congress, and adopted and authorized by the provisions of section 1 of the Act of August 30, 1935 (49 Stat. 1028, at 1038) . . . shall, when appropriated, be available for expenditure in accordance with the said plans of the Secretary of Interior instead of the Secretary of War.”
AutoNDA by SimpleDocs
Xxxxxxx Slough Navigation Flow Requirements Under Federal Law. Congress initially authorized the construction of certain facilities for the Central Valley Project (“CVP”) under the Rivers and Harbors Act of 1935 (the “1935 Act”). (49 Stat. 1028, 1038). The 1935 Act mandated in relevant part that “the following works of improvement of rivers . . . are hereby adopted and authorized . . . in accordance with the plans recommended in the respective reports hereinafter designated and subject to the conditions set forth in such documents . . . Sacramento River, California; Rivers and Harbors Committee Document Numbered 35, Seventy-third Congress ” (50 Stat. 1028,

Related to Xxxxxxx Slough Navigation Flow Requirements Under Federal Law

  • CFR Part 200 or Federal Provision - Xxxx Anti-Lobbying Amendment - Continued If you answered "No, Vendor does not certify - Lobbying to Report" to the above attribute question, you must download, read, execute, and upload the attachment entitled "Disclosure of Lobbying Activities - Standard Form - LLL", as instructed, to report the lobbying activities you performed or paid others to perform. Compliance with all applicable standards, orders, or requirements issued under section 306 of the Clean Air Act (42 U.S.C. 1857(h)), section 508 of the Clean Water Act (33 U.S.C. 1368), Executive Order 11738, and Environmental Protection Agency regulations (40 CFR part 15). (Contracts, subcontracts, and subgrants of amounts in excess of $100,000) Pursuant to the above, when federal funds are expended by ESC Region 8 and TIPS Members, ESC Region 8 and TIPS Members requires the proposer certify that in performance of the contracts, subcontracts, and subgrants of amounts in excess of $250,000, the vendor will be in compliance with all applicable standards, orders, or requirements issued under section 306 of the Clean Air Act (42 U.S.C. 1857(h)), section 508 of the Clean Water Act (33 U.S.C. 1368), Executive Order 11738, and Environmental Protection Agency regulations (40 CFR part 15). Does vendor certify compliance? Yes

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • CERTIFICATION PROHIBITING DISCRIMINATION AGAINST FIREARM AND AMMUNITION INDUSTRIES (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree, when it is applicable, to the following required by Texas law as of September 1, 2021: If (a) company is not a sole proprietorship; (b) company has at least ten (10) full-time employees; (c) this contract has a value of at least $100,000 that is paid wholly or partly from public funds; (d) the contract is not excepted under Tex. Gov’t Code § 2274.003 of SB 19 (87th leg.); and (e) governmental entity has determined that company is not a sole-source provider or governmental entity has not received any bids from a company that is able to provide this written verification, the following certification shall apply; otherwise, this certification is not required. Pursuant to Tex. Gov’t Code Ch. 2274 of SB 19 (87th session), the company hereby certifies and verifies that the company, or association, corporation, partnership, joint venture, limited partnership, limited liability partnership, or limited liability company, including a wholly owned subsidiary, majority-owned subsidiary parent company, or affiliate of these entities or associations, that exists to make a profit, does not have a practice, policy, guidance, or directive that discriminates against a firearm entity or firearm trade association and will not discriminate during the term of this contract against a firearm entity or firearm trade association. For purposes of this contract, “discriminate against a firearm entity or firearm trade association” shall mean, with respect to the entity or association, to: “ (1) refuse to engage in the trade of any goods or services with the entity or association based solely on its status as a firearm entity or firearm trade association; (2) refrain from continuing an existing business relationship with the entity or association based solely on its status as a firearm entity or firearm trade association; or (3) terminate an existing business relationship with the entity or association based solely on its status as a firearm entity or firearm trade association. See Tex. Gov’t Code § 2274.001(3) of SB 19. “Discrimination against a firearm entity or firearm trade association” does not include: “ (1) the established policies of a merchant, retail seller, or platform that restrict or prohibit the listing or selling of ammunition, firearms, or firearm accessories; and (2) a company’s refusal to engage in the trade of any goods or services, decision to refrain from continuing an existing business relationship, or decision to terminate an existing business relationship to comply with federal, state, or local law, policy, or regulations or a directive by a regulatory agency, or for any traditional business reason that is specific to the customer or potential customer and not based solely on an entity’s or association’s status as a firearm entity or firearm trade association.” See Tex. Gov’t Code § 2274.001(3) of SB 19.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • How Are Contributions to a Xxxx XXX Reported for Federal Tax Purposes You must file Form 5329 with the IRS to report and remit any penalties or excise taxes. In addition, certain contribution and distribution information must be reported to the IRS on Form 8606 (as an attachment to your federal income tax return.)

  • Sector Sub-Sector Industry Classification Level of Government Type of Obligation Description of Measure Source of Measure All sectors : : - : Central : National Treatment Senior Management and Board of Directors : National Treatment and the Senior Management and Board of Directors obligations shall not apply to any measure relating to small and medium sized domestic market enterprise2. Foreign equity is restricted to a maximum of 40% for domestic market enterprises with paid-in equity capital of less than the equivalent of USD 200,000 Note: Members of the Board of Directors or governing body of corporation or associations shall be allowed in proportion to their allowable participation or share in the capital of such enterprises. : -1987 Constitution of the Republic of the Philippines. - Foreign Investments Act of 1991 (R.A. No. 7042, as amended by R.A. No. 8179). -Presidential and Administrative Issuances. ∞ 2 The concept of a small and medium sized domestic market enterprise is an enterprise with paid in equity capital of less than the equivalent of USD 200,000.00.

  • DEFENSE FEDERAL ACQUISITION REGULATION SUPPLEMENT CONTRACT CLAUSES 252.246-7000 MATERIAL INSPECTION AND RECEIVING REPORT (MAR 2008)

  • Compliance with Certain Requirements of Regulations; Deficit Capital Accounts In the event the Company is “liquidated” within the meaning of Regulations Section 1.704-1(b)(2)(ii)(g), distributions shall be made pursuant to this Article X to the Unit Holders who have positive Capital Accounts in compliance with Regulations Section 1.704-1(b)(2)(ii)(b)(2). If any Unit Holder has a deficit balance in such Member’s Capital Account (after giving effect to all contributions, distributions and allocations for all Fiscal Years, including the Fiscal Year during which such liquidation occurs), such Unit Holder shall have no obligation to make any contribution to the capital of the Company with respect to such deficit, and such deficit shall not be considered a debt owed to the Company or to any other Person for any purpose whatsoever. In the discretion of the Liquidator, a pro rata portion of the distributions that would otherwise be made to the Unit Holders pursuant to this Article X may be: (i) distributed to a trust established for the benefit of the Unit Holders for the purposes of liquidating Company assets, collecting amounts owed to the Company, and paying any contingent or unforeseen liabilities or obligations of the Company, in which case the assets of any such trust shall be distributed to the Unit Holders from time to time, in the reasonable discretion of the Liquidator, in the same proportions as the amount distributed to such trust by the Company would otherwise have been distributed to the Unit Holders pursuant to Section 10.2 of this Agreement; or (b) withheld to provide a reasonable reserve for Company liabilities (contingent or otherwise) and to reflect the unrealized portion of any installment obligations owed to the Company, provided that such withheld amounts shall be distributed to the Unit Holders as soon as practicable.

  • REQUIRED FOR PART 2 JOC - PRICING OF Regular Hours Coefficient What is your regular hours coefficient for the RS Means Price Book? (FAILURE TO RESPOND PROHIBITS PART 2 JOC EVALUATION)

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!