Decant Protocol Sample Clauses

Decant Protocol. The Parties agree to perform their respective obligations under the Decant Protocol. Notwithstanding anything to the contrary in this Agreement, where the only failure(s) to satisfy the Services Availability Requirements [or the Post Completion Works Acceptance Requirements (as the case may be)] in relation to a School arise as a direct result of a breach by the Authority of its obligations contained in the Decant Protocol, then: the Independent Certifier shall issue an Acceptance Certificate if it is satisfied all the other Service Availability Requirements [or the Post Completion Works Acceptance Requirements (as the case may be)] have been met in relation to the relevant School; and the Parties shall agree, acting reasonably, any necessary revision to the decanting timetable for the relevant School in accordance with the Decant Protocol. To the extent that the Contractor subsequently breaches the Decant Protocol in relation to the relevant School, the provisions of Schedule 6 (Payment Mechanism) shall apply. If by the date that falls ten (10) Business Days after the ICT Handover Date the Contractor has not completed its obligations under paragraphs 7 and 16.4 of the Decant Protocol the Authority shall be entitled to employ an alternative contractor to carry out those activities and shall be entitled to be reimbursed by the Contractor for all costs properly and reasonably incurred in the carrying out of any such activities. ICT Installer’s acts/omissions and the Acceptance Certificate Subject to clauses 20.10.2 the Parties acknowledge that notwithstanding that the ICT Handover Acceptance Certificate has been issued, the Independent Tester shall be entitled to refuse to issue the Acceptance Certificate on the basis that on the date of inspection pursuant to clause 20.1.2 the ICT Handover Requirements are no longer being met in respect of the School. Where the Contractor can show that the ICT Installer has caused the ICT Handover Requirements to not be met upon the inspection referred to in clause 20.10.1 the Acceptance Certificate will be issued and the Authority’s remedy shall be against the ICT Installer and not the Contractor. DELAY AND SUPERVENING UNAVAILABILITY Liquidated Damages/Provision of Temporary Accommodation OPTION 1:
AutoNDA by SimpleDocs
Decant Protocol. 1.9The Parties agree to perform their respective obligations under the Decant Protocol.
Decant Protocol. The provisions of the D&B Contract ensure that there is an agreed arrangement for decant existing between the Authority and the LEP or the National Framework Contractor. The Academy will not be a direct party to that protocol and therefore the Authority will need to establish background arrangements with the Academy that reflects in turn the protocol. As the protocol will need to be developed on a project specific basis no provision has been made within the Agreement defining the obligations of the parties and the way in which consultation will occur in relation to changes to the protocol. These matters should be established on a project specific basis having regard to such matters as the construction programme, phasing and use of temporary accommodation. Consideration should also be given in relation to the provision of ICT within the Academy facilities and any decanting arrangements that should be provided for.

Related to Decant Protocol

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Joint Occupational Health and Safety Committee The Employer and the Union recognize the role of the joint Occupational Health and Safety Committee in promoting a safe and healthful workplace. The parties agree that a Joint Occupational Health and Safety Committee shall be established for each Employer covered by this Collective Agreement. The Committee shall govern itself in accordance with the provisions of the Industrial Health and Safety Regulations made pursuant to the Workers’ Compensation Act. The Committee shall be as between the Employer and the Union, with equal representation, and with each party appointing its own representatives. Representatives of the Union shall be chosen by the Union membership or appointed by the Union. All minutes of the meetings of the Joint Occupational Health & Safety Committee will be recorded in a mutually agreeable format and will be sent to the Union. The Union further agrees to actively pursue with the other Health Care Unions a Joint Union Committee for the purposes of this Article. The Employer agrees to provide or cause to be provided to Employer members of the Joint Occupational Health and Safety Committee adequate training and orientation to the duties and responsibilities of committee members to allow the incumbents to fulfil those duties competently. The Union agrees to provide or cause to be provided to Union members of the Joint Occupational Health and Safety Committee adequate training and orientation to the duties and responsibilities of committee members to allow the incumbents to fulfil those duties competently. Such training and orientation shall take place within six (6) months of taking office.

  • Electrical appliance safety The Hirer shall ensure that any electrical appliances brought by them to the premises and used there shall be safe, in good working order, and used in a safe manner in accordance with the Electricity at Work Regulations 1989. Where a residual circuit breaker is provided the hirer must make use of it in the interests of public safety.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Signaling protocol The Parties will interconnect their networks using SS7 signaling where Technically Feasible and available as defined in GR 905 Telcordia Standards including ISDN User Part (ISUP) for trunk signaling and TCAP for CCS-based features in the Interconnection of their networks. All Network Operations Forum (NOF) adopted standards shall be adhered to. Where available, CenturyLink signaling services to link its Signaling Transfer Points (STPs) for CLEC switches which connect to CenturyLink’s STPs via “A” links or for CLEC’s STPs to connect to CenturyLink’s STPs via “D” links which are dedicated to the transport of signaling for local Interconnection, may be ordered from the CenturyLink Tariff.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Joint Funded Project with the Ohio Department of Transportation In the event that the Recipient does not have contracting authority over project engineering, construction, or right-of- way, the Recipient and the OPWC hereby assign certain responsibilities to the Ohio Department of Transportation, an authorized representative of the State of Ohio. Notwithstanding Sections IV, VI.A., VI.B., VI.C., and VII of the Project Agreement, Recipient hereby acknowledges that upon notification by the Ohio Department of Transportation, all payments for eligible project costs will be disbursed by the Grantor directly to the Ohio Department of Transportation. A Memorandum of Funds issued by the Ohio Department of Transportation shall be used to certify the estimated project costs. Upon receipt of a Memorandum of Funds from the Ohio Department of Transportation, the OPWC shall transfer funds directly to the Ohio Department of Transportation via an Intra-State Transfer Voucher. The amount or amounts transferred shall be determined by applying the Participation Percentages defined in Appendix D to those eligible project costs within the Memorandum of Funds. In the event that the Project Scope is for right-of-way only, notwithstanding Appendix D, the OPWC shall pay for 100% of the right-of-way costs not to exceed the total financial assistance provided in Appendix C. APPENDIX D LOCAL SUBDIVISION CONTRIBUTION, PROJECT FINANCING AND EXPENSES SCHEME AND DISBURSEMENT RATIO

  • Function of Joint Health and Safety Committee All incidents involving aggression or violence shall be brought to the attention of the Joint Health and Safety Committee. The Employer agrees that the Joint Health and Safety Committee shall concern itself with all matters relating to violence to staff.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 5.1 Scope of Traffic 13 5.2 Trunk Group Architecture and Traffic Routing 13 5.3 Logical Trunk Groups 13 5.4 End Office Access 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 6.1 Meet-Point Billing Services 14 6.2 Data Format and Data Transfer 14 6.3 Errors or Loss of Access Usage Data 15 6.4 Payment 15 6.5 Additional Limitation of Liability Applicable to Meet-Point Billing Arrangements 16 ARTICLE VII BLV/BLVI TRAFFIC 16

Time is Money Join Law Insider Premium to draft better contracts faster.