Business Practices and Related Requirements Clause Samples

Business Practices and Related Requirements. ‌ The PEC is expected to be an ambassador for NYSERDA and any New Construction Initiative. Any conduct to the contrary will result in disciplinary action. Under this Agreement, each PEC commits to promoting New Construction Initiatives and the mission of improving the energy performance, durability, comfort, and safety of newly constructed buildings. All PECs shall remain in full compliance with the terms of this Agreement including the following business practices:
Business Practices and Related Requirements. The Partner is expected to be an ambassador for NYSERDA and this Program. Any conduct to the contrary will result in disciplinary action. Under this Agreement, each Partner commits to promoting this Program and the mission of improving the energy performance, durability, comfort, and safety of newly constructed residential housing. All Partners shall remain in full compliance with the terms of this Agreement including the following business practices:
Business Practices and Related Requirements. The Partner is expected to be an ambassador for NYSERDA and the Residential and Multifamily New Construction Programs. Any conduct to the contrary will result in disciplinary action. Under this Agreement, each Partner commits to promoting LR NCP and MF NCP and the mission of improving the energy performance, durability, comfort, and safety of newly constructed residential and multifamily housing. All Partners shall remain in full compliance with the terms of this Agreement including the following business practices:

Related to Business Practices and Related Requirements

  • Business Practices 1. Parties recognise that certain business practices of service suppliers, other than those falling under Article 14 (Monopolies and Exclusive Service Suppliers), may restrain competition and thereby restrict trade in services. 2. Each Party shall, at the request of any other Party, enter into consultations with a view to eliminating practices referred to in Paragraph 1. The Party addressed shall accord full and sympathetic consideration to such a request and shall co-operate through the supply of publicly available non- confidential information available to the requesting Party. The requested Party may also provide other information available to the requesting Party, subject to its domestic law and to the conclusion of satisfactory agreement concerning the safeguarding of its confidentiality by the requesting Party.

  • Certain Business Practices Neither Company nor any Company Subsidiary nor any directors, officers, agents or employees of Company or any Company Subsidiary (in their capacities as such) has (i) used any funds for unlawful contributions, gifts, entertainment or other unlawful expenses relating to political activity or (ii) made any unlawful payment to foreign or domestic government officials or employees or to foreign or domestic political parties or campaigns or violated any provision of the Foreign Corrupt Practices Act of 1977, as amended.

  • Ethical Business Practices The Contractor shall work in partnership with the State to ensure a successful and valuable contract, and ethical practices are required of State employees, Contractors, and all parties representing the Contractor. All work performed under this Contract will be subject to review by the Inspector General of the State of Florida, and any findings suggesting unethical business practices may be cause for termination or cancellation.

  • Unfair Business Practices Contractor represents and warrants that it has not been the subject of allegations of Deceptive Trade Practices violations under Chapter 17 of the Texas Business and Commerce Code, or allegations of any unfair business practice in any administrative hearing or court suit and that Contractor has not been found to be liable for such practices in such proceedings. Contractor certifies that it has no officers who have served as officers of other entities who have been the subject of allegations of Deceptive Trade Practices violations or allegations of any unfair business practices in an administrative hearing or court suit and that such officers have not been found to be liable for such practices in such proceedings.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.