Donor Visibility and Visit Sample Clauses

Donor Visibility and Visit. (a) The Recipient shall take or cause to be taken all such measures as the World Bank may reasonably request to identify publicly the Donor’s support for the Project.
AutoNDA by SimpleDocs
Donor Visibility and Visit. The Recipient shall take or cause to be taken all such measures as the World Bank may reasonably request to identify publicly the European Union support for the Project. For the purposes of Section 2.09 of the Standard Conditions, the Recipient shall upon the World Bank’s request, take all measures required on its part to enable the representatives of the European Union to visit any part of the Recipient’s territory for purposes related to the Project.

Related to Donor Visibility and Visit

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Access to and Use of Content Customer has the right to access and use applicable Content subject to the terms of applicable Order Forms, this Agreement and the Documentation.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • HELMETS TO HARDHATS Section 1. The Contractors and the Unions recognize a desire to facilitate the entry into the building and construction trades of veterans who are interested in careers in the building and construction industry. The Contractors and Unions agree to utilize the services of the Center for Military Recruitment, Assessment and Veterans Employment (hereinafter “Center”) and the Center’s “Helmets to Hardhats” program to serve as a resource for preliminary orientation, assessment of construction aptitude, referral to apprenticeship programs or hiring halls, counseling and mentoring, support network, employment opportunities and other needs as identified by the parties.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Nepotism No employee shall be awarded a position where he/she is to be directly supervised by a member of his/her immediate family. “

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Fire Fighting Costs of operating and maintaining the fire-fighting equipments and personnel, if any.

  • Quality- and Cost-Based Selection Except as ADB may otherwise agree, the Borrower shall apply quality- and cost-based selection for selecting and engaging consulting services.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Time is Money Join Law Insider Premium to draft better contracts faster.