Monitoring protocol Sample Clauses

Monitoring protocol. All Authorized Agencies shall monitor, the use of the NYS DOL / OMH Employment Support System by their Employees, agents, and contractors/service providers in the workplace on a regular ongoing basis to ensure that the data and information is accessed and provided solely in accordance with authorized employment program activities, and shall take appropriate remedial action for any unauthorized use. OMH and ▇▇▇ agree to the follow monitoring protocol for this purpose. The DOL/OMH Joint Management Committee shall establish, and shall require Authorized Agencies, agents, and contractors/service providers to establish, systems, protocols, and procedure to ensure that Employees, agents, and contractors/service providers are complying with the confidentiality requirements of this Agreement. OMH will delegate access to OMH Authorized Agencies and their respective users. Access will be granted consistent with each user’s need for information access and data security appropriate to each user’s responsibilities in accordance with the NYS DOL / OMH Employment Support System security permissions established by the DOL/OMH Joint Management Committee. In addition, OMH and DOL shall each designate a Security Officer, and require each Authorized Agency, and its agents, or contractors/service providers authorized to access new system, to designate a Security Officer responsible to implement security policies and procedures to ensure and monitor proper use of the NYS DOL / OMH Employment Support System by its Employees. Such policies and procedures must include, but not be limited to: i) facility security to safeguard the facility and the equipment therein from unauthorized physical access, tampering and theft; ii) workstation safeguards to restrict access to authorized users; iii) requiring supervisory staff to conduct periodic and regular walk through office areas to observe and determine whether staff are complying with confidentiality requirements; iv) reviewing records of system activity, such as exception lists and v) promptly reporting security incidents. The Security Officer shall conduct accurate and thorough assessments of the potential risks and vulnerabilities to the confidentiality and integrity of the NYS DOL / OMH Employment Support System’s data available to its staff and take measures to reduce these risks and vulnerabilities. Finally, each security officer shall maintain adequate records to document compliance with both the security protocols and the confi...
Monitoring protocol. The project does not have a detailed monitoring protocol by which indicators, their definition and the methods to measure them in time are explained, which presents some differences in how they are defined and completed during the life of the project. For future projects it is advisable to have this protocol containing definitions, form and frequency measurement with respect to the baseline.
Monitoring protocol. Adaptive management requires monitoring of the target species and the associated habitats to observe their response to the different Program activities. Each Program activity shall be periodically evaluated by the Governance Committee to assess its success in meeting Program goals relative to other Program activities. Evaluations will: (1) assess whether the Program activity being examined is working as originally envisioned; (2) recommend modifications if necessary; (3) determine whether there are other or better uses for the resources committed to this activity; and (4) assess whether success or failure could be determined by monitoring over the time period evaluated. Evaluations will include independent peer review by experts selected by the Governance Committee. This information will be used to direct resources to the most beneficial activities.
Monitoring protocol. Medi-Cal Managed Care Health Plans
Monitoring protocol. ‌ The point-intercept method (▇▇▇▇▇▇▇ et al. 1998) will be used to quantitatively monitor vegetation. This method is currently being used at several wetland sites managed and monitored by the City of Eugene. Consistency in monitoring methods will allow for repeatability and reliability among monitoring staff, as well as facilitate cross-referencing of monitoring results. Point-intercept sampling will take place in spring or early summer. A baseline will be created along the eastern edge of the site, parallel to Green Hill Road. From this baseline approximately 8-10 transects will extend east to west across the site. Markers will be installed along the baseline providing the location of each transect. Sample points will be taken along each transect at paced intervals of approximately 45 meters, with the first point randomly placed within 5 meters of the baseline. Approximately 125 sample points will be systematically interspersed along transects, and a tripod and steel rod will be used to determine the point location. For each point, every individual plant that intercepts the tip of the rod will be recorded. Each species will be recorded as an individual sample, meaning that cover may exceed 100%. If the rod does not contact any vegetation at the point, the recorder will note the presence of bare ground, ▇▇▇▇, or litter. Plots with bare ground will be annotated if cause is late inundation. Percent absolute cover of each species will be calculated and an 80% confidence interval will be provided for all estimates. These calculations will be used to determine whether success criteria have been achieved for the current monitoring period. Although point-intercept sampling provides a high level of accuracy, it occasionally discounts the presence of species with low cover values. Therefore, walking surveys will be conducted to provide measurements of species richness by species census. Walking surveys will occur at least twice during the growing season. The surveyor will create a comprehensive list of all plant species observed during the walk-through. Special attention will be paid to recording and mapping the presence of invasive plant species and uncommon native, wetland plant species. A representative set of pools will be sampled for depth in spring when water depths are expected to be at their deepest. A late summer walk-through of the wettest areas will map any persistent standing water areas. Species of concern observed on the Bank will be noted, such as an...

Related to Monitoring protocol

  • Signaling protocol 4.1.3.1 SS7 Signaling is AT&T-21STATE’s preferred method for signaling. Where MF signaling is currently used, the Parties agree to use their best efforts to convert to SS7. If SS7 services are provided by AT&T-21STATE, they will be provided in accordance with the provisions of the applicable access tariffs. 4.1.3.2 Where MF signaling is currently used, the Parties agree to interconnect their networks using MF or dual tone MF (DTMF) signaling, subject to availability at the End Office Switch or Tandem Switch at which Interconnection occurs. The Parties acknowledge that the use of MF signaling may not be optimal. AT&T-21STATE will not be responsible for correcting any undesirable characteristics, service problems or performance problems that are associated with MF/SS7 inter-working or the signaling protocol required for Interconnection with CLEC employing MF signaling.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Monitoring System In each case in which the Custodian has exercised delegated authority to place Assets with a Foreign Custodian, the Custodian shall establish a system, to re-assess or re-evaluate selected Foreign Custodians, at least annually in accordance with Rule 17f-5(c)(3).

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards. 2. Grantee agrees to cooperate fully and provide the System Agency and its representatives timely access to Products, records, and other items and information needed to conduct such review, evaluation, testing, and monitoring.