Food insecurity Sample Clauses

Food insecurity. In 1996, the World Food Summit declared that food security exists “when all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life” (WHO, 2012) (no page). Food security has four main components: food availability (sufficient amount of food regularly available), food access (sufficient resources to procure nutritious food), food use (proper use of food and knowledge of appropriate nutrition), and stability of the three preceding components over time (WHO, 2012). Areas experiencing food insecurity are known as food deserts; the Healthy Food Financing Initiative, part of First Lady Xxxxxxxx Xxxxx’x Let’s Move! initiative, defines a food desert as a low-income census tract where a substantial number of residents cannot access a large supermarket or grocery store (USDA, 2012). Many rural areas where agriculture is an important part of the economy (including parts of Xxxxxxxx and Xxxxxx Counties in southwest Georgia, where data for this study were collected) are, paradoxically, food deserts (see Figure 1 below). In one census tract in Xxxxxx County with 1675 total people, 59.7% had low access to healthy food, while 15.3% had low access and were low-income. Similarly, 30.5% of the 4339 people in a census tract in Xxxxxxxx County had low access, while 3.9% had low access and were low- income (USDA, 2012). Notably absent from these statistics are the undocumented workers who, by definition, cannot be counted in population estimates. Figure 1: Food deserts (shaded areas) in southwest Georgia (USDA, 2012). Causes of food insecurity/low diet diversity. There are several possible explanations for the xxxxx discrepancies between the prevalence of food insecurity among farm workers and that of the general population. The first is that the poor conditions in which farm workers live and work make it difficult to access and buy healthy food. An estimated 61% of all individual farmworkers have incomes below federal poverty levels (Xxxxxx & Xxxxxxx, 2003). Two other major problems associated with living in a migrant farm camp are limited transportation and lack of access to cooking facilities, both of which have been found to contribute to food insecurity (Hill, et al., 2011). In addition to the physical and financial obstacles that keep farm workers from accessing healthy foods, there may also be more subtle influences on food insecurity. Specifically, Borre, et al. (2010) and Xxxxxxx (2002) both postulate that the biggest ...
AutoNDA by SimpleDocs

Related to Food insecurity

  • Insecurity Lender in good faith believes itself insecure.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Appropriation of Performance Security Upon occurrence of a Concessionaire Default, the Authority shall, without prejudice to its other rights and remedies hereunder or in law, be entitled to invoke, encash and appropriate the relevant amounts from the Performance Security as Damages for such Concessionaire Default. Upon such invocation, encashment and appropriation from the Performance Security, the Concessionaire shall, within [30 (thirty)] days thereof, replenish, in case of partial appropriation, to its original level the Performance Security, and in case of appropriation of the entire Performance Security provide a fresh Performance Security, as the case may be, and the Concessionaire shall, within the time so granted, replenish or furnish fresh Performance Security as aforesaid failing which the Authority shall be entitled to terminate this Agreement in accordance with Article 37. Upon replenishment or furnishing of a fresh Performance Security, as the case may be, as aforesaid, the Concessionaire shall be entitled to an additional Cure Period of [90 (ninety)] days for remedying the Concessionaire Default, and in the event of the Concessionaire not curing its default within such Cure Period, the Authority shall be entitled to invoke, encash and appropriate such Performance Security as Damages, and to terminate this Agreement in accordance with Article 37.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

Time is Money Join Law Insider Premium to draft better contracts faster.