Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins. (2) Maintain waterbars, drainage dips, and other water diversion measures. (3) During active use, patrol and maintain functional drainage. (4) Repair damaged culvert ends.
Wiring When wiring of any kind is introduced, it must be connected as directed by Landlord, and no boring or cutting for wires will be allowed, except with the prior written consent of Landlord. The location of telephones, call boxes, telephone boards, and other office equipment in the Premises shall be prescribed by Landlord.
Moonlighting Employee will focus his/her professional time, ability, and attention on City business during the term of this Agreement. To the extent consistent with applicable law, Employee shall not engage in any other business duties or pursuits whatsoever or, directly or indirectly, render any services of a business, commercial, or professional nature to any other person or organization, whether for compensation or otherwise, without the prior consent of the City Manager, except that: (1) The expenditure of reasonable amounts of time not in conflict with the City's needs and interests, for educational, charitable, community, and professional activities, shall not be deemed a breach of this Agreement and shall not require prior consent. (2) This Agreement shall not be interpreted to prohibit Employee from making passive personal investments or conducting private business affairs if those activities do not materially interfere with the services required under this Agreement or create conflicts of interest.
Infrastructure Modification of the location and/or sizing of the infrastructure for the Project that does not materially change the functionality of the infrastructure.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.