Description of Services (a) Services Provided on an Ongoing Basis, If Applicable.
Description of Units Subject to the terms hereof the Fund proposes to issue and to offer for sale an aggregate of 15,000,000 of its limited liability company member units (the “Units”), at a price of $10 per Unit through you and those licensed brokers, if any, designated by you.
General Description of Services The A-E will be contacted by COUNTY Project Management staff on an “as-needed” basis as projects arise to provide A-E for professional services. Requirements will be discussed by both Parties and A-E shall prepare a written Scope Statement that will include the specific work to be performed, including the costs and time required to complete the project/task. Orange COUNTY Project Management staff will then review the A-E’s Scope Statement, proceed with negotiation of task costs and when satisfied, issue a Contract Task Order (CTO) against this CONTRACT. The A-E shall serve as lead of a design team that may include other construction design professionals working together to ensure that the original design is carried through to the finished product, with no alterations in materials or design that would lead to safety issues or compromise the quality of the building or building component. Other team members who may be retained by the lead to support a project as a consultant may include but are not limited to landscape architects, lighting designers, data consultants, security consultants, controls engineers, commissioning consultants, traffic engineers, surveyors, estimators, special inspection, etc. The A-E shall be responsible for the preparation of comprehensive building assessments, designs, drawings, specifications, cost estimates, and reports within the scope of the Contract Task Order (CTO). In the preparation of construction drawings and specification, the A-E shall also responsible for:
Description of Work (a) that has been omitted or
Description of Funding Techniques 6.2.1 The following are terms under which standard funding techniques shall be implemented for all transfers of funds to which the funding technique is applied in section 6.3.2 of this Agreement. Funding Technique Name Description Actual Clearance, ZBA - ACH The State shall request funds such that they are deposited by ACH in a State account on the settlement date of payments issued by the State. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be for the amount of funds that clear the State's account on the settlement date. This funding technique is interest neutral. Actual Clearance, ZBA - Same Day Payment The State shall request funds the same day it pays out funds, in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. A Federal agency will deposit funds in a State account the same day as requested. The amount of the request shall be for the amount of funds that clear the State's account that day. This funding technique is interest neutral. Average Clearance The State shall request funds such that they are deposited by ACH on the dollar- weighted average day of clearance for the disbursement, in accordance with the clearance pattern specified in Exhibit II. The request shall be made in accordance with the appropriate Federal agency cut-off time specified in Exhibit I. The amount of the request shall be for the exact amount of that disbursement. This funding technique is interest neutral.
Description of Deliverables The Contractor shall Perform as set forth in Exhibit A.
Description of Goods As ordered by each JBE under a Participating Addendum, Contractor shall provide to the JBEs the following products, goods, materials, and supplies (“Goods”) free and clear of all liens, claims, and encumbrances, and in accordance with this Agreement:
Description of the Project THIS SHOULD BE NO MORE THAN A TWO PARAGRAPH DESCRIPTION THAT PROVIDES A BACKGROUND OF THE PROBLEM, AS WELL AS HOW THE CONTRACTOR INTENDS TO SOLVE THE PROBLEM. KEEP IN MIND THAT THE CONTRACT SHOULD “STAND ON ITS OWN,” I.E. ANYONE SHOULD BE ABLE TO PICK IT UP AND FIGURE OUT WHAT IS GOING ON.)
Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.
Topic Description Licensee Responsibilities Licensee must: Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy. Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3. Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx. Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information. These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature. Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request. Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them. Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials. Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce. Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.