Resiliency Programming Sample Clauses

Resiliency Programming. In our current work focused on extreme weather, we are working with partner organizations to assess minority and low-income communities' vulnerability to extremely hazardous substance facilities (CAA 112r), traffic and hazardous waste proximity.
AutoNDA by SimpleDocs
Resiliency Programming. In our current work focused on climate change, we are working with partner organizations to assess mobile home vulnerability to flooding in the coastal region and Upper Connecticut River Valley. NHDES will also continue to collaborate with our climate change adaptation workgroup partners in planning workshops and providing outreach materials to EE/EJ communities about climate change and its impacts.

Related to Resiliency Programming

  • Frequency Protection Should Company install any type of radio transceiver or other wireless communications equipment, Company will provide frequency protection within the aviation air/ground VHF frequency band and the UHF frequency band in accordance with restrictions promulgated by the Federal Aviation Administration (FAA) for the vicinity of FAA Transmitter or Receiver facilities. Frequency protection will also be provided for all other frequency bands operating in the vicinity of Company’s equipment. Should interference occur as a result of Company’s installation, Authority reserves the right to shut down Company’s installation until appropriate remedies to the interference are made by Company. Such remedies may include relocation to another site. The cost of all such efforts to remedy the interference will be solely at Company’s expense.

  • Synchronization The Licensor hereby grants limited synchronization rights for One (1) music video streamed online (Youtube, Vimeo, etc..) for up to 500,000 non-monetized video streams on all total sites. A separate synchronisation license will need to be purchased for distribution of video to Television, Film or Video game.

  • Screens 3.2.1.1 The proposed Generating Facility's Point of Interconnection must be on a portion of the Utility's Distribution System.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Emergency Procedures a) ENP providers shall have a written Emergency/Disaster Plan.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Streaming The Licensee is entitled to an unlimited amount audio streams (on all streaming platforms such as Spotify) and unlimited video streams (on all platforms supporting video such as Youtube) for the song(s) created with the composition. All streaming royalties generated by the Licensee's song(s) belong to the Licensee.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

Time is Money Join Law Insider Premium to draft better contracts faster.