Palm Tree Pruning Sample Clauses

The Palm Tree Pruning clause sets out the requirements and standards for the maintenance and trimming of palm trees on a property. Typically, it specifies how often pruning should occur, who is responsible for performing the work, and any safety or disposal procedures that must be followed. For example, it may require that dead fronds and fruit be removed regularly to maintain the health and appearance of the trees. This clause ensures that palm trees are properly cared for, reducing safety hazards and maintaining the aesthetic value of the property.
Palm Tree Pruning. Palm Pruning consists of maintaining the crowns and trunks of palm trees including the pruning of spent or declining fronds, seed pods and the skinning or shaping of spent petiole bases into a ball or nut as applicable by palm type. 1. Palm trees shall be trimmed using a handsaw or pole saw that has been sanitized before and after the handsaw is used to cut the fronds of any other palm tree. 2. Live, healthy fronds, initiating at an angle of 90 degrees or greater from the horizontal plane, shall not be removed. Fronds removed should be cut close to the petiole base, taking into consideration the role of petiole bases in the formation and maintenance of the ornamental ball at the base of the canopy, as applicable by species. 3. Live trunk tissue should never be cut while pruning palm trees. 4. The use of chainsaws to prune any frond, fruit or flower structures from any Canary Island Date Palm will result in severe Contract penalties. 5. Using properly sterilized equipment as described herein, any fruit or flower structures in the crown of the palm shall be removed concurrently with frond pruning. 6. Care shall be taken in the handling of fruit and flowers as they are likely to release clear liquids that react with and can cause staining to hardscape elements. The Contractor shall be responsible for removing palm fruit related stains from private property hardscape elements. 7. Maintenance of the ornamental ball located at the base of the palm canopy, directly below the live fronds, shall be as described by species as follows:
Palm Tree Pruning. Contractor may be issued a work order to prune palm trees. Pruning of palm fronds, including the removal of fruit, occurs during the months of July and August. Date Palms are trimmed on an as needed basis. The City will provide a list of locations, palm species and count to the Contractor for review. Once the Contractor has verified the list they will submit a schedule to the City Representative for approval. Palm tree pruning must be completed before September 1st.

Related to Palm Tree Pruning

  • TREE TRIMMING 16.1 Customer Agreements to provide Customer is responsible for tree trimming: Subject to any written agreement between a Customer and the Distributor, and any statutory provision, the Trader must ensure that each of its Customer Agreements provides that the Customer must comply with its obligations under the Electricity (Hazards from Trees) Regulations 2003 in respect of any trees that the Customer has an interest in that are near any line that forms part of the Network.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Dewatering (a) Where the whole of a site is so affected by surface water following a period of rain that all productive work is suspended by agreement of the Parties, then dewatering shall proceed as above with Employees so engaged being paid at penalty rates as is the case for safety rectification work. This work is typically performed by Employees engaged within CW1, CW2 or CW3 classifications. When other Employees are undertaking productive work in an area or areas not so affected then dewatering will only attract single time rates. (b) Where a part of a site is affected by surface water following a period of rain, thus rendering some areas unsafe for productive work, consistent with the Employer’s obligations under the OH&S Act, appropriate Employees shall assist in the tidying up of their own work site or area if it is so affected. Where required, appropriate Employees will be provided with the appropriate PPE. Such work to be paid at single time rates. Productive work will continue in areas not so affected. (c) To avoid any confusion any ‘dewatering’ time which prevents an Employee from being engaged in their normal productive work is not included in any calculation for the purposes of determining whether an Employee is entitled to go home due to wet weather (refer clauses 32.4 and 32.5)

  • Drainage Systems (1) Clear culvert inlets, outlets, and sediment catching basins. (2) Maintain waterbars, drainage dips, and other water diversion measures. (3) During active use, patrol and maintain functional drainage. (4) Repair damaged culvert ends.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.