DUST CONTROL & WATERING Sample Clauses

DUST CONTROL & WATERING. Add the following: The Contractor shall make her own arrangements for developing a water supply suitable to compact and provide adequate dust control.
AutoNDA by SimpleDocs

Related to DUST CONTROL & WATERING

  • Dust Control Dust-proof enclosures or partitions for protection wherever dusty or dirty work is performed and dampening of debris to avoid dusting when removed shall be provided and included as a cost of the work.

  • Pest Control A. Whenever a department utilizes a pest control chemical in State owned or managed buildings/grounds, the department will provide at least forty-eight (48) hours notice prior to application of the chemical, unless an infestation occurs which requires immediate action. Notices will be posted in the lobby of the building and will be disseminated to building tenant contacts.

  • Erosion and Sediment Control The Contractor shall install and maintain erosion and sediment control devices to prevent adjacent streets, storm drains and property from accumulations of soil, sediment, or dust which result from his work. Devices installed to control sediment and prevent erosion shall comply with the requirements of the Georgia Tech Project Superintendent. The Contractor is responsible for monitoring downstream conditions throughout the construction period and clearing any debris, sediment, and dust caused by the progress of the Work. The Contractor shall inspect, maintain, and clear erosion and sediment control devices at least weekly unless otherwise directed by the Georgia Institute of Technology Construction Manager. At the conclusion of the Work, the Contractor shall remove all installed devices and restoring the site to the satisfaction of the Georgia Tech Construction Manager.

  • Cost Control The budget established by the OWNER for the construction of the Project and CONSULTANT fee shall be considered as absolute. The CONSULTANT shall advise OWNER in writing of the following:

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Agreement Controls In the event that any term of any of the Loan Documents other than this Agreement conflicts with any express term of this Agreement, the terms and provisions of this Agreement shall control to the extent of such conflict.

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer. Measures: • SAP uses controls and processes to monitor compliance with contracts between SAP and its customers, subprocessors or other service providers. • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • All SAP employees and contractual subprocessors or other service providers are contractually bound to respect the confidentiality of all sensitive information including trade secrets of SAP customers and partners.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

Time is Money Join Law Insider Premium to draft better contracts faster.