Database Policies and Regulations Sample Clauses

Database Policies and Regulations. All users shall abide by all policies and regulations pertaining to the information from the CLETS. Procedures and message formats contained in user manuals must be followed exactly.
AutoNDA by SimpleDocs

Related to Database Policies and Regulations

  • Policies and Regulations 34 In addition to the Federal Acquisition Regulation (FAR) clauses referred to 35 and listed herein of this Request for Proposal (RFP), the contractor shall 36 comply with the Federal Regulations, Acts, Executive Orders, Special 37 Publications, Guidelines, NOAA Directives and Policies and standards listed 38 below. This listing is not all-inclusive and is not intended to relieve the 39 contractor of its responsibilities for identification of applicable statutes, 40 regulations and procedures and compliance therewith, when performing work 41 under this SOW. 42  Xxxxxxxx-Xxxxxxx Xxxxxxx, Management, and Conservation Act (MSA) 43  Marine Mammal Protection Act (MMPA) 44  Endangered Species Act (ESA) 45  Data Quality Control Act (P.L. 106-514) 46  Information Technology Security Policy 47  Fisheries Management Plans (FMP) 48  Biological Opinions (BO) 49  Take Reduction Team (TRT) 50  NOAA Safety Standards 1  Fair Labor Standards Act (FLSA) 2  Service Contract Act (SCA) 3  Department of Labor Wage Determinations 4  Applicable Federal and State labor laws 5  At-Sea Monitor Health and Safety regulations 6  Federal, state, and local safety regulations 7  Merchant Marine Act (Xxxxx Act) and General Maritime Law 8  U.S. Xxxxxxxxx and Harbor Worker’s Compensation Act

  • CODES AND REGULATIONS The Contractor shall strictly comply with all Federal, State and local codes and regulations.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • Use Guidelines 3.3.1. The JAGGAER Applications are provided to Client for use only as expressly set forth in the Agreement, and Client will not use the JAGGAER Applications in whole or in part for any other use or purpose. In particular, Client will not, and will not allow any third party to: (i) decompile, disassemble, reverse engineer or attempt to reconstruct, identify or discover any source code, underlying ideas, underlying user interface techniques or algorithms of the JAGGAER Applications by any means, or disclose any of the foregoing; (ii) except as expressly set forth in the Agreement, provide, rent, lease, lend, or use the JAGGAER Applications for timesharing, subscription, or service bureau purposes; (iii) sublicense, transfer or assign the JAGGAER Applications or any of the rights or licenses granted under the Agreement; or remove or obscure any trademark, product identification, proprietary marking, copyright or other notices provided with the JAGGAER Applications or related documentation.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • SUBSTANCE ABUSE POLICY 6.6.1. Labor and Management are committed to providing employees with a drug-free and alcohol-free workplace. It is the goal to protect the health and safety of employees and to promote a productive workplace, and protect the reputation of Labor and Management and the employees.

  • Software compliance Unless explicitly agreed, software being used and developed to provide the service should: ● Be licensed under an open source and permissive license (like MIT, BSD, Apache 2.0,...). ● The license should provide unlimited access rights to the EGI community. ● Have source code publicly available via a public source code repository (if needed a mirror can be put in place under the EGI organisation in GitHub13.) All releases should be appropriately tagged. ● Adopt best practices: ○ Defining and enforcing code style guidelines. ○ Using Semantic Versioning. ○ Using a Configuration Management frameworks such as Ansible. ○ Taking security aspects into consideration through at every point in time. ○ Having automated testing in place. ○ Using code reviewing. 9 xxxxx://xxx.xxx.xx/about/policy/policies_procedures.html 10 xxxxx://xxxx.xxx.xx/wiki/OMB 11 xxxx://xxx.xxx.xx/ 12 xxxxx://xxx.xxx.xx/portal/index.php?Page_Type=NGI&id=4 13 xxxxx://xxxxxx.xxx/EGI-Foundation ○ Treating documentation as code. ○ Documentation should be available for Developers, administrators, and end users.

Time is Money Join Law Insider Premium to draft better contracts faster.