Access Rules Sample Clauses

Access Rules. The City may implement rules governing PEG Access Channels and programming.
AutoNDA by SimpleDocs
Access Rules. While on County's premises in connection with the performance of this Agreement, Contractor shall cause its personnel to comply with County's applicable rules with respect to security, conduct and other matters concerning access to County's premises. Such rules may require in some cases background checks and escorts for Contractor and subcontractor personnel. Upon receipt of notice from County's Authorized Representative, Contractor shall immediately remove any of its personnel assigned to perform work under this Agreement who do not comply with such rules.
Access Rules i. The City shall implement rules for use of any specially designated access channels. The initial access rules and any amendments thereto shall be maintained on file with the City and available for public inspection during Normal Business Hours.

Related to Access Rules

  • Business Rules The response interval starts when the CLEC’s Mechanized Loop Makeup Service Inquiry (LMUSI) is submitted electronically through the Operational Support Systems interface, LENS, TAG or RoboTAG. It ends when BellSouth’s Loop Facility Assignment and Control System (LFACS) responds electronically to the CLEC with the requested Loop Makeup data via LENS, TAG or RoboTAG Interfaces. Note: The Loop Make Up Service Inquiry Form does not require the CLEC to furnish the type of Loop. The CLEC determines whether the loop makeup will support the type of service they wish to order or not and qualifies the loop. If the loop makeup will sup- port the service, a firm order LSR is submitted by the CLEC. EDI is not a pre-ordering system, and, therefore, is not applicable in this measure. Calculation Response Interval = (a - b) • a = Date and Time the LMUSI returned to CLEC • b = Date and Time the LMUSI is received Average Interval = (c ÷ d) • c = Sum of all response intervals • d = Total Number of LMUSIs received within the reporting period Percent within interval = (e ÷ f) X 100 • e = Total LMUSIs received within the interval • f = Total Number of LMUSIs processed within the reporting period Report Structure • CLEC Aggregate • CLEC Specific • Geographic Scope - State - Region • Interval for electronic LMUs: 0 – < 1 minute >1 – < 5 minutes 0 - ≤ 5 minutes > 5 – < 8 minutes > 8 – < 15 minutes > 15 minutes • Average Interval in minutes PO-2: Loop Make Up - Response Time - Electronic Data Retained Relating to CLEC Experience Relating to BellSouth Performance • Report Month • Legacy Contract • Response Interval • Regional Scope • Not Applicable SQM Disaggregation - Analog/Benchmark SQM Level of Disaggregation SQM Analog/Benchmark • Loop Benchmark • 95% ≤ 1 Minute SEEM Measure SEEM Measure Yes Tier I Tier II X SEEM Disaggregation - Analog/Benchmark SEEM Disaggregation SEEM Analog/Benchmark • Loop • 95% ≤ 1 Minute O-1: Acknowledgement Message Timeliness

  • Safety Rules 5.01 The safety rules of the State having jurisdiction shall be observed by the parties hereto. It is recognized that the Employer has the exclusive responsibility for providing a safe and healthful workplace. To assist the Employer in maintaining an effective and continuing safety program, a permanent Joint Safety Committee shall be established, consisting of two (2) members from the Union and two (2) members from the Employers, who shall meet at regular times to administer educational instructions, investigate serious accidents, and to draft appropriate safety rules. Such rules as adopted by this committee, shall become a part of this Agreement.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Access Requirements You will be responsible for providing the System to enable you to use an Electronic Service.

  • Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.

  • SAFETY PROCEDURES The Contractor shall:

  • DATA/ACCESS/CONFIDENTIALITY/ PRESERVATION 10.1 As used in this Agreement, the word “data” shall mean all information and things developed or obtained during the performance of, or acquired or developed by reason of, this Agreement, including, but not limited to, all studies, reports, files, formulae, surveys, maps, charts, sound recordings, video recordings, pictorial reproductions, drawings, analyses, graphic representations, computer programs, computer printouts, notes, letters, memoranda, papers, and documents, all whether finished or unfinished.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Access Codes Tenant shall provide Landlord/Broker with all access codes to all entrance gates and security systems located on the Property.

Time is Money Join Law Insider Premium to draft better contracts faster.