I. IDENTIFY AND PROTECT INSTREAM FLOWS Sample Clauses

I. IDENTIFY AND PROTECT INSTREAM FLOWS. Recovery cannot be accomplished without securing, protecting, and managing sufficient flows to provide habitat to support self-sustaining endangered fish populations. Identification and protection of instream flows are key elements in this process. The first step in instream flow protection is to identify flow regimes needed by the fish, typically characterized in terms of peak and base flow needs over a range of hydrologic conditions. In the Recovery Program, determining flow needs is primarily the responsibility of the Service (in cooperation with other participants). Factors considered in determining flow needs include: flow effects on reproduction and recruitment; flow effects on food supplies and nonnative fishes; and interrelationships between flow and other habitat parameters believed to be important for the fish, such as channel structure, sediment transport, substrate characteristics, vegetative encroachment, and water temperature. Flow recommendations often are made in stages, with initial flow recommendations based on the best available scientific information, historic conditions, and extrapolation from similar reaches. Recommendations then are refined following additional field research. The contribution of tributaries to recovery was ranked by Xxxx and Xxxxxxxx (2001). Flow recommendations have been approved for reaches of the Colorado (Osmundson and Xxxxxxx 1991; XxXxx 2003), Yampa (Xxxxx and Xxxxx 1995; Xxxxx et al. 1999), Xxxxx (Xxxx et al. 2000), Gunnison (XxXxx 2003), and Xxxxxxxx (Xxxxx and Xxxxxxx 2003) xxxxxx. Flows in the Little Snake and Yampa rivers after estimated future depletions were identified in the Yampa River Management Plan and Environmental Assessment (Xxxxx 2004). Interim flow recommendations for the White River were completed in 2004 (Xxxxxx et al. 2004), and are currently under revision. A White River management plan will be drafted in 2016-17, which will ultimately serve as the basis for a White River programmatic biological opinion. This management plan will include flow recommendations. Under the Gunnison River Basin Programmatic Biological Opinion and Aspinall Unit Study Plan (2011), the Recovery Program is conducting monitoring to assess how well the operation of the Aspinall Unit contributes to meeting target flows in the Gunnison and Colorado Rivers and to help determine if managed flows from the Gunnison and the Colorado rivers are sufficient for recovery on the Colorado River from the Gunnison River to the conf...
AutoNDA by SimpleDocs

Related to I. IDENTIFY AND PROTECT INSTREAM FLOWS

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Customer Identification - USA Patriot Act Notice The Lender hereby notifies the Borrower that pursuant to the requirements of the USA Patriot Act (Title III of Pub. L. 107-56, signed into law October 26, 2001) (the “Act”), and the Lender’s policies and practices, the Lender is required to obtain, verify and record certain information and documentation that identifies the Borrower, which information includes the name and address of the Borrower and such other information that will allow the Lender to identify the Borrower in accordance with the Act.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust has determined that the Procedures, as part of the Trust’s overall anti-money laundering program and the Red Flag Identity Theft Prevention program, are reasonably designed to prevent the Fund from being used for money laundering or the financing of terrorist activities and to achieve compliance with the applicable provisions of the Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust:

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Customer Identification Program (A) To assist the Fund in complying with requirements regarding a customer identification program in accordance with applicable regulations promulgated by U.S. Department of Treasury under Section 326 of the USA PATRIOT Act (“CIP Regulations”), BNYM will do the following:

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

Time is Money Join Law Insider Premium to draft better contracts faster.