Small Business Enterprise and MWBE Policy Compliance Clause Samples

Small Business Enterprise and MWBE Policy Compliance. The Developer is hereby advised that the City has adopted policies (the “SBE and MWBE Policies”) to provide small, minority and woman-owned business enterprises with the maximum practical opportunity in the performance of public contracts, as further described in Appendix E. The Developer hereby agrees that, in connection with the Premises and the Hotel Project Improvements Work and the Developer’s performance of its obligations hereunder, the Developer shall abide by all applicable terms and conditions of the SBE and MWBE Policies. The Developer shall, in turn, include the requirements of this Section 11.1 in its contracts, and the contracts to be entered into by the Contractor, in connection with the Premises and the Hotel Project Improvements Work

Related to Small Business Enterprise and MWBE Policy Compliance

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at ▇▇▇▇▇://▇▇▇.▇▇.▇▇▇/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Public safety compliance The Hirer shall comply with all conditions and regulations made in respect of the premises by the Local Authority, the Licensing Authority, and the hall’s Fire Risk Assessment or otherwise, particularly in connection with any event which constitutes regulated entertainment, at which alcohol is sold or provided or which is attended by children. The Hirer shall also comply with the hall’s health and safety policy. The Fire Service shall be called to any outbreak of fire, however slight, and details shall be given to the secretary of the management committee. (a) The Hirer acknowledges that they have received instruction in the following matters: • The action to be taken in event of fire. This includes calling the Fire Brigade and evacuating the hall. • The location and use of fire equipment. (Include diagram of location when handing over keys.) • Escape routes and the need to keep them clear. • Method of operation of escape door fastenings. • Appreciation of the importance of any fire doors and of closing all fire doors at the time of a fire. • Location of the first aid box. (b) In advance of any activity whether regulated entertainment or not the Hirer shall check the following items: • That all fire exits are unlocked and panic bolts in good working order. • That all escape routes are free of obstruction and can be safely used for instant free public exit. • That any fire doors are not wedged open. • That exit signs are illuminated. • That there are no obvious fire hazards on the premises. • That emergency lighting supply illuminating all exit signs and routes are turned on during the whole of the time the premises are occupied (if not operated by an automatic mains failure switching device).

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Privacy Compliance The Provider shall comply with all applicable federal, state, and local laws, rules, and regulations pertaining to Student Data privacy and security, all as may be amended from time to time.