Port and Sample Clauses

Port and. From a trade and investment perspective, port facilities are crucial. The Baku Port is the principal on the Caspian, and unfortunately its cargo handling facilities are poor. Even with reduced port activity over the past several years with respect to bulk and container goods, the existing stevedore and warehousing capacity cannot safely meet current demand. According to those who are closely associated with port activities, dry cargo and ferry tonnage in 1998 and early 1999 increased slightly over prior years, yet the total volume today may be less than a third handled in 1990. The number of people employed under Azerbaijan’s port authorities is roughly 800 persons - down from more than 3,000 in 1990. Meanwhile, requirements for oil shipping is expected to rise by as much as 10 percent each of the next four years. The EBRD has a commitment to assist in rehabilitation of the Baku port system, and EC-Tacis has more than $4 million in technical assistance grants to revamp the port’s traffic management and customs processing systems.
AutoNDA by SimpleDocs

Related to Port and

  • Support and Services ISD and HC agree to the following conditions:

  • Export Control This Agreement is made subject to any restrictions concerning the export of products or technical information from the United States or other countries that may be imposed on the Parties from time to time. Each Party agrees that it will not export, directly or indirectly, any technical information acquired from the other Party under this Agreement or any products using such technical information to a location or in a manner that at the time of export requires an export license or other governmental approval, without first obtaining the written consent to do so from the appropriate agency or other governmental entity in accordance with Applicable Law.

  • Export Administration Each party agrees to comply with all export laws and regulations of the United States (“Export Laws”) to assure that no software deliverable, item, service, technical data or any direct product thereof arising out of or related to this Agreement is exported directly or indirectly (as a physical export or a deemed export) in violation of Export Laws.

  • Customer Support and Training System Agency will provide support for the CMBHS, including problem tracking and problem resolution. System Agency will provide telephone numbers for Grantees to obtain access to expert assistance for CMBHS-related problem resolution. System Agency will provide initial CMBHS training. Grantee shall provide subsequent ongoing end-user training.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Procurement of Small Works Works estimated to cost less than $50,000 equivalent per contract, up to an aggregate amount not to exceed $500,000 equivalent, may be procured under lump-sum, fixed-price contracts awarded on the basis of quotations obtained from three (3) qualified domestic contractors in response to a written invitation. The invitation shall include a detailed description of the works, including basic specifications, the required completion date, a basic form of agreement acceptable to the Association, and relevant drawings, where applicable. The award shall be made to the contractor who offers the lowest price quotation for the required work, and who has the experience and resources to complete the contract successfully. Part D: Review by the Association of Procurement Decisions

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Open and Transparent Consistent with ICANN’s expressed mission and core values, ICANN shall operate in an open and transparent manner.

Time is Money Join Law Insider Premium to draft better contracts faster.