Drill Requirement Clause Samples

Drill Requirement. Each County will conduct at least two different SNS drills utilizing the Target Metric template provided by DSNS/ADHS. An executive summary and improvement plan must be submitted for each drill. Jurisdictions shall provide ADHS with the Target Metrics by January 10, 2014 and April 25, 2014 respectively.
Drill Requirement. Tier I and Tier II jurisdictions are required to participate in the ADHS Sponsored DSNS Inventory Resource Management System Drill. These public health jurisdictions shall also conduct at least one (1) DSNS drill utilizing the Target Metric template provided by DSNS/ADHS. This drill may be conducted in conjunction with a larger exercise or on its own. The associated data tool shall be completed and provided to ADHS by June 30 2013, selected from the listing below: 4.4.1 Dispensing through-put data collection from exercise with specified CDC-identified metrics or virtual practice using CDC Real Opt Data Collection Program, 4.4.2 Timed Point of Dispensing (POD) set up per County Plan (Facility Set-up): to receive credit from the CDC a completed Excel-based spreadsheet (provided by the SNS Coordinator) shall be submitted to ADHS, 4.4.3 Staff Notification, Acknowledgement and Assembly, or 4.4.4 Resource Allocation game.
Drill Requirement. Tier III partners that plan to establish point(s) of dispensing in an emergency, shall conduct one (1) DSNS drill utilizing the Target Metric template provided by DSNS/ADHS by October 9, 2012. One (1) of the following drills shall be performed: 4.5.1 Dispensing through-put data collection, 4.5.2 Decision Making Assessment Tool, 4.5.3 Facility Set Up, or 4.5.4 Pick List Generation.

Related to Drill Requirement

  • Operational Requirements The Client will adhere to the deadlines and other operational requirements set out in the Client Publications, to facilitate meeting the requirements of CSD’s, Third Party Agents and Market Participants.

  • General Requirement Any notice, election, demand, request, consent, approval, or other communication required or permitted to be given under this Contract shall be in writing signed by an officer or duly authorized representative of the party making same and shall be delivered personally or shall be sent by certified or statutory mail, postage prepaid, return receipt requested, shall be effective as of the date on which it is received or would have been received but for the refusal of the addressee to accept delivery, and shall be addressed as shown in the Contract. The persons and addresses to which notices should be given may be changed by notice given in accordance with this Article.

  • Capital Requirements If any Lender or the L/C Issuer determines that any Change in Law affecting such Lender or the L/C Issuer or any Lending Office of such Lender or such Lender’s or the L/C Issuer’s holding company, if any, regarding capital requirements has or would have the effect of reducing the rate of return on such Lender’s or the L/C Issuer’s capital or on the capital of such Lender’s or the L/C Issuer’s holding company, if any, as a consequence of this Agreement, the Commitments of such Lender or the Loans made by, or participations in Letters of Credit held by, such Lender, or the Letters of Credit issued by the L/C Issuer, to a level below that which such Lender or the L/C Issuer or such Lender’s or the L/C Issuer’s holding company could have achieved but for such Change in Law (taking into consideration such Lender’s or the L/C Issuer’s policies and the policies of such Lender’s or the L/C Issuer’s holding company with respect to capital adequacy), then from time to time the Borrower will pay to such Lender or the L/C Issuer, as the case may be, such additional amount or amounts as will compensate such Lender or the L/C Issuer or such Lender’s or the L/C Issuer’s holding company for any such reduction suffered.

  • General Requirements The Contractor hereby agrees:

  • Functional Requirements Applications must implement controls that protect against known vulnerabilities and threats, including Open Web Application Security Project (OWASP) Top 10 Risks and denial of service (DDOS) attacks.