Avoid Gatherings Clause Samples

Avoid Gatherings. The student is prohibited from hosting or attending gatherings in YHC residence halls. The student also agrees to refrain from hosting or attending any social gatherings in excess of what is currently allowed by the current executive order of the Governor, or any other state and local guidelines, off campus.

Related to Avoid Gatherings

  • Gas If Customer has selected a Gas Fixed Rate, Customer’s Price will be based on the Fixed Rate(s), plus the Administration Charge, set forth in the Application, which includes RITERATE ENERGY’s compressor fuel and transportation charges, administrative and transaction costs and the Gas Balancing Amount and any Regulatory Charges (defined below).

  • Dark Fiber Transport Dark Fiber Transport is defined as Dedicated Transport that consists of unactivated optical interoffice transmission facilities without attached signal regeneration, multiplexing, aggregation or other electronics. Except as set forth in Section 6.9.1 below, BellSouth shall not be required to provide access to Dark Fiber Transport Entrance Facilities pursuant to this Agreement.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Pipelines Developer shall have no interest in the pipeline gathering system, which gathering system shall remain the sole property of Operator or its Affiliates and shall be maintained at their sole cost and expense.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.