The Framework Sample Clauses

The Framework. The Framework Agreement is for the provision of an Mini Bus and Coach Hire with Driver Services and has been awarded in RANKING ORDER to the following Providers: LOT 1 MINI BUS HIRE WITH DRIVER WITH CAPACITY OF UP TO 22 PASSENGERS RANK PROVIDER 1 YMS Travel Limited (Xxxxxxxxxx, Xxxx) 2 The Kings Ferry (Xxxxxxxxxx, Xxxx) 3 Grange Travel Coach Hire Ltd (Gravesend, Kent) 4 ASD Coaches (Strood, Kent) 5 Regents Coaches (Xxxxxxxxxxx, Kent) LOT 2a COACH HIRE WITH DRIVER WITH CAPACITY OF UP TO 36 PASSENGERS RANK PROVIDER 1 Grange Travel Coach Hire Ltd (Gravesend, Kent) 2 The Kings Ferry (Xxxxxxxxxx, Xxxx) 3 Regents Coaches (Xxxxxxxxxxx, Kent) 4 ASD Coaches (Strood, Kent) 5 Scotland & Xxxxx Ltd (Xxxxxxx, Xxxx) LOT 2b COACH HIRE WITH DRIVER WITH CAPACITY OF UP TO 60 PASSENGERS RANK PROVIDER 2 The Kings Ferry (Xxxxxxxxxx, Xxxx) 3 Regents Coaches (Xxxxxxxxxxx, Kent) 4 Scotland & Xxxxx Ltd (Xxxxxxx, Xxxx) 5 Xxxxxxxx Coaches Ltd (Folkstone, Kent) LOT 3 AIRPORT ARRIVALS TRANSFER SERVICE WITH DRIVER AND CAPACITY OF UP TO 60 PASSENGERS AND LUGGAGE. RANK PROVIDER 1 Grange Travel Coach Hire Ltd (Gravesend, Kent) 2 Regents Coaches (Xxxxxxxxxxx, Kent) 3 The Kings Ferry (Xxxxxxxxxx, Xxxx) 4 Scotland & Xxxxx Ltd (Xxxxxxx, Xxxx) LOT 4 WEEKEND COACH HIRE WITH DRIVER WITH CAPACITY OF UP TO 60 PASSENGERS RANK PROVIDER 1 The Kings Ferry (Xxxxxxxxxx, Xxxx) 2 Xxxxxxxx Coaches Ltd (Folkstone, Kent) 3 Grange Travel Coach Hire Ltd (Gravesend, Kent) Users MUST use the Provider in order of Rank for the relevant Lot starting at Rank No 1.
The Framework. The packaging of a medical device must be furnished with a UDI. According to the FDA, this UDI can involve a standard identification system: HIBCC, ICCBBA or GS1.15 The EU is expected to adopt this format, which also forms the starting point for this document. In order to achieve a safe and workable system in hospitals, it is imperative that the UDI in question meets certain international wants and needs, such as the requirement that the UDI must uniquely identify the product type. Codes have a variety of formats: • The linear bar-code, or ‘1D code’; • The Data Matrix, or ‘2D code’; An example of a linear bar-code: Two examples of a Data Matrix: 15
The Framework. The main objective of SHARE is to provide a community-based living seismic hazard model for the Euro-Mediterranean region and to provide a sustainable mechanism for future updates as new scientific sound methods and data are available. The project aims to establish new standards in Probabilistic Seismic Hazard Assessment (PSHA) practice by a close cooperation of leading European seismologists and engineers. In particular, the project employs state-of-the art Information Technology (IT) to disseminate the data and results to expert and interested non-expert users such as the media and general public. Access to data and results will be granted to the public and specialist through a single entry point, the SHARE Portal via the project web-page at: SHARE ensures full technical compatibility with the portal technology adopted for other portals in the seismological community. In cooperation with the European-Mediterranean Seismologcial Centre (EMSC) and the foundation for Observatories and Research Facilities for European Seismology (ORFEUS), we ensure not only compatibility in terms of portlets consumable in the different portals, but also in terms of the data services it is based on. SHARE designs its service infrastructure as a comprehensive and homogeneous access point to European seismic hazard data that will be further enhanced within the FP7-funded project “Network of European Research Infrastructures for Earthquake Risk Assessment and Mitigation “ (NERA) to serve the expert seismological, engineering seismology and engineering community as well as non-expert communities. SHARE started to design a facility for hazard and risk assessment as the European component of the Global Earthquake Model Foundation (GEM) and will in cooperation with NERA cooperatively ensure the implementation of the European Facility for Hazard and Risk (EFEHR) as primary access to hazard and risk data and results in Europe. This document describes the design of the architecture that works behind the scenes of the portal GUI and allows interactive as well as script-based data access: the web services. We outline the technical and non-technical requirements, the implementation strategy and defines remaining tasks.
The Framework. All the components of the kernel-space IRATI stack rely on a base framework that is composed by the following parts: rmem: This part implements a common memory management layer that provides additional features over the basic primitives available for dynamic memory allocation and de-allocation (i.e. kmalloc, kzalloc and kfree). These features provide additional debugging functionalities such as memory tampering (adding pre-defined shims on-top/at-bottom of the memory area to detect out-of-rage writes) and poisoning (initializing the object contents with a known value to detect uninitialized usage) specifically tailored to RINA objects; allowing developers to easily spot memory leaks as well as memory corruption problems.
The Framework. 5.1 There are circumstances where it is not possible for a Care Leaver to be placed in supported accommodation using the block provision. Firstly, as an Inner London local authority, there is limited capacity for placements located in the borough. In addition, there could be safeguarding issues preventing a young person from remaining in the borough, or if a young person was placed in care outside of the borough, they may wish to remain in that area after leaving care.
The Framework. The Smart Grid Framework for interoperability and cybersecurity is technology agnostic, so as to address as many technological scenarios and environments as possible. The methodology is designed to provide guidance to ease risk management consistent with an organization’s approach to cybersecurity, and tries to integrate both privacy and cybersecurity concepts. The Framework complements the organization’s risk management strategy; it does not substitute it at all. Its main components are the following: - The Framework Core, which is composed of five concurrent Functions: identify (understanding business context, critical functions and associated resources and cybersecurity risks), protect (limiting an eventual cybersecurity event), detect (developing the necessary activities to identify the occurrence of a security event), respond (developing the necessary activities to take actions as a result of the detection of a cybersecurity event) and recover (developing the necessary activities to resume normal operation after the occurrence of a security event, trying to reduce its negative impact). Taken as a whole, these five functions provide a strategic view of the lifecycle of an organization’s management of cybersecurity risk. It also defines key Categories and Subcategories for each function, and matches each of them with the corresponding standards, guidelines and practices, which constitute the Informative References. - The Framework implementation Tiers: the Tiers characterize an organization’s practices over a range, starting from “Partial” (Tier 1) to “Adaptive” (Tier 4), and reflecting a progression from informal responses to approaches that are risk-informed. There are 4 Tiers: Partial (in this stage, cybersecurity risk management practices are not formalized, and risk is managed on an ad hoc and reactive basis), Risk informed (in this stage, risk management practices are approved by management but may not be established as organizational-wide policy), Repeatable (in this stage, the organization’s risk management practices are formally approved and expressed as policy) and Adaptive (in this case, the organization adapts its cybersecurity practices based on its experience and adopts predictive indicators derived from previous and current cybersecurity activities). - A Framework Profile: a Profile represents the outcomes based on business needs that an organization has selected from the Framework Categories and Subcategories, and it can be described by ...
The Framework. The Government of Ukraine and the UNDaPre in mutual agreement to the content of this document and their responsibilities in the implementation of the country programme. Furthering their mutual agreement and cooperation for the realization of the Millennium Development Goals and the United Nations Conventions and Summits to which the Government of Ukraine and UNDP are committed, including:

Related to The Framework

  • Legal Framework 1. This programme agreement shall be read in conjunction with the following documents which, together with this programme agreement, constitute the legal framework of the EEA Financial Mechanism 2014-2021:

  • Framework This Agreement establishes a framework that will enable Red Hat to provide Software and Services to Client. “Software” means Red Hat Enterprise Linux, JBoss Enterprise Middleware and other software programs branded by Red Hat, its Affiliates and/or third parties including all modifications, additions or further enhancements delivered by Red Hat. The specific services (the “Services”) and/or Software that Red Hat will provide to Client will be described in an Order Form, signed by the parties or otherwise accepted by Red Hat, which may consist of (a) one or more mutually agreed order forms, statements of work, work orders or similar transaction documents, or (b) an order placed by Client through Red Hat's online store accessible from a Red Hat website. The parties agree that the terms of this Agreement will govern all purchases and use by Client of Software and Services unless otherwise agreed by the parties in writing.

  • SCOPE OF FRAMEWORK AGREEMENT 3.1 This Framework Agreement governs the relationship between the Authority and the Supplier in respect of the provision of the Services by the Supplier to the Authority and to Other Contracting Bodies.

  • Vendor Ombudsman Pursuant to section 215.422(7), Florida Statutes, the Florida Department of Financial Services has established a Vendor Ombudsman, whose duties and responsibilities are to act as an advocate for vendors who may have problems obtaining timely payments from state agencies.

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA.

  • Outreach and Education The agencies agree to coordinate, conduct joint outreach presentations, and prepare and distribute publications, when appropriate, for the regulated community of common concern. • The agencies agree to work with each other to provide a side-by-side comparison of laws with overlapping provisions and jurisdiction. • The agencies agree to provide a hyperlink on each agency’s website linking users directly to the outreach materials in areas of mutual jurisdiction and concern. • The agencies agree to jointly disseminate outreach materials to the regulated community, when appropriate. • All materials bearing the DOL or DOL/WHD name, logo, or seal must be approved in advance by DOL. • All materials bearing the OEAS name, logo, or seal must be approved in advance by OEAS.

  • Service Level Agreements If a Service or a Plan includes a Service Level Agreement (SLA):

  • Service Level Agreement Subject to the terms and conditions of this Agreement, Bank agrees to perform the custody services provided for under this Agreement in a manner that meets or exceeds any service levels as may be agreed upon by the parties from time to time in a written document that is executed by both parties on or after the date of this Agreement, unless that written document specifically states that it is not contractually binding. For the avoidance of doubt, Bank’s Service Directory shall not be deemed to be such a written document.

  • Quality- and Cost-Based Selection 1. Except as otherwise provided in Part C of this Section, consultants’ services shall be procured under contracts awarded in accordance with the provisions of Section II of the Consultant Guidelines, and the provisions of paragraphs 3.13 through 3.18 thereof applicable to quality- and cost-based selection of consultants.

  • Procurement of Goods Part A: General Goods shall be procured in accordance with the provisions of Section I of the “Guidelines for Procurement under IBRD Loans and XXX Credits” published by the Bank in January 1995 and revised in January and August 1996, September 1997 and January 1999 (the Guidelines) and the following provisions of Section I of this Schedule. Part B: International Competitive Bidding