Description of Alternatives Sample Clauses

Description of Alternatives. This chapter describes the alternatives considered in this EA (Alternative AProposed Action and Alternative BNo Action), as well as alternatives that were considered but eliminated from detailed analysis.
AutoNDA by SimpleDocs
Description of Alternatives. 4.1 Introduction Two alternatives were identified for this project: the No Action Alternative and the Proposed Action. The alternatives consist of two parts: the water supply agreement and on- refuge management. On-refuge management addresses how Level 2 water supplies and the Level 4 increment would be used on the refuges to achieve the purposes of the CVPIA. In addition, alternatives considered but not carried forward for detailed analysis are described.
Description of Alternatives appropriate goals, measures, timetables, and plans to ensure that water is being efficiently applied to beneficial uses. The plans are to be updated every 5 years. After passage of the CVPIA, a number of parties recognized the need for the development of Best Management Practices / Efficient Use Plans for the refuges to ensure that the refuge water supplies were being efficiently used in keeping with the Reclamation Reform Act. In 1996, Interior responded by directing that an Interagency Coordinated Program (ICP) be instituted to provide a common methodology for water use planning for all wetlands areas receiving water authorized by the CVPIA. In 1997, the U.S. Department of the Interior, represented by Reclamation, the Service, CDFG, and the Grassland WD assembled a Task Force for this purpose. The Task Force provided guidance and advice in the development of the report An
Description of Alternatives. A preliminary project description would be developed by Ascent sufficient to support the NOP and NOI. This project description would be revised and expanded to include any project changes/refinements and further project details that are developed after scoping. To be sufficient to support the impact analysis, the project description will include locational descriptions, details of proposed project elements, construction methods, hours and season of operations, interrelationships with current operations, employment, visitation, and level of recreation. Projections of visitation generated by the project would be based on data provided by the applicant team. It is assumed that the alternatives that would receive a full analysis in each chapter of the EIR/EIS would consist of the Proposed Action Alternative, the No Action Alternative, and up to two additional action alternatives (e.g., an alternative with a modified site layout or reduced development). The analysis of each alternative would be conducted at a comparable level of detail consistent with the requirements of NEPA. The alternatives chapter will also identify alternatives that were initially considered but not evaluated further, including justification for why these alternatives were not provided a full analysis in the EIR/EIS. Approach to the Analysis This chapter will assist the reader in understanding the EIR/EIS and the subsequent chapters in the document. Topics to be addressed will include: ⯈ the differences between CEQA and NEPA and the approach to addressing these differences in a joint document; ⯈ an overview of the organization, content, and approach taken in each resource analysis chapter; ⯈ the general approach taken for the cumulative effects analysis; ⯈ characterization of past and present projects that influence the existing cumulative condition; and ⯈ the list of reasonably foreseeable future projects considered in the cumulative analysis taken in the impact analysis.
Description of Alternatives 

Related to Description of Alternatives

  • Description of Services (a) Services Provided on an Ongoing Basis, If Applicable.

  • Description of Activities The objectives of the activities (Activities) to be financed under this Trust Fund are to contribute to: (a) enhanced capacity for effective policy formulation in the countries of grant recipients of the African Capacity Building Foundation (variously, “ACBF” or “Recipient”); and (b) improvements in the management of ACBF’s operations. The Activities consist of the following:

  • Description of Work (a) that has been omitted or

  • Detailed Description of Services / Statement of Work Describe fully the services that Contractor will provide, or add and attach Exhibit B to this Agreement.

  • Description of Service 2.14.1.1 BellSouth shall make available to <<customer_name>> loop makeup (LMU) data for BellSouth's network facilities. This section addresses LMU as a preordering transaction, distinct from <<customer_name>> ordering any other service(s). Loop Makeup Service Inquiries (LMUSI) for preordering loop makeup are likewise unique from other preordering functions with associated service inquiries (SI) as described in this Agreement.

  • Description of Projects Services

  • Description of Program This Agreement is established to facilitate an exchange program at the partner institution with students, faculty and researchers from each institution (collectively, the “Exchange Program”). The student exchange program enables students from one university to take classes at the other university while working towards a degree at the university where he or she is formally enrolled (individually, the “Student Exchange”) and to encourage faculty members and researchers from each university to visit the other university and engage in certain activities (individually, the “Faculty/Researcher Exchange”). [Substitute the purpose of your program if different.] For purposes of this Agreement, with respect to the Student Exchange, the term “Home University” shall mean the institution in which a student is formally enrolled as a degree candidate, and “Host University” shall mean the institution that has agreed to receive students from the Home University for a period of study. With respect to the Faculty/Researcher Exchange, as used herein, “Home University” shall mean the university where the faculty member and/or researcher is normally employed, and “Host University” shall mean the university that the faculty member and/or researcher is visiting.

  • Topic Description Licensee Responsibilities Licensee must:  Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy.  Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3.  Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx.  Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information.  These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature.  Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request.  Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them.  Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials.  Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends  Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce.  Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach  Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and  Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.

  • DESCRIPTION OF PROJECT The project for which PSP agrees to provide Professional Services is generally described as [Insert Brief Description of Project] (hereinafter referred to as the “Project”), as further described in Exhibit A, PSP’s Proposal dated [Insert Date and Proposal Number if provided], attached hereto and incorporated herein for all purposes and consisting of [Text] (Insert Number) pages.

  • Description of Goods or Services and Additional Terms and Conditions The Contractor shall perform as set forth in Exhibit A. For purposes of this Contract, to perform and the performance in Exhibit A is referred to as “Perform” and the “Performance.”

Time is Money Join Law Insider Premium to draft better contracts faster.