Avoid track switches Sample Clauses

Avoid track switches. The switch points are controlled from a remote location, can move unexpectedly, and exert enough force to crush ballast rock. Stand 150 feet from track switches when trains are approaching. Stay away from any other railroad device with which you are not familiar.
AutoNDA by SimpleDocs

Related to Avoid track switches

  • Tandem Switching 4.5.1 The Tandem Switching capability Network Element is defined as: (i) trunk-connect facilities, which include, but are not limited to, the connection between trunk termination at a cross-connect panel and switch trunk card; (ii) the basic switch trunk function of connecting trunks to trunks; and (iii) the functions that are centralized in the Tandem Switches (as distinguished from separate end office switches), including but not limited to call recording, the routing of calls to operator services and signaling conversion features. 4.5.2 Where <<customer_short_name>> utilizes portions of the BellSouth network in originating or terminating traffic, the Tandem Switching rates are applied in call scenarios where the Tandem Switching Network Element has been utilized. Because switch recordings cannot accurately indicate on a per call basis when the Tandem Switching Network Element has been utilized for an interoffice call originating from a UNE port and terminating to a BellSouth, Independent Company or Facility-Based CLEC office, BellSouth has developed, based upon call studies, a melded rate that takes into account the average percentage of calls that utilize Tandem Switching in these scenarios. BellSouth shall apply the melded Tandem Switching rate for every call in these scenarios. BellSouth shall utilize the melded Tandem Switching Rate until BellSouth has the capability to measure actual Tandem Switch usage in each call scenario specifically mentioned above, at which point the rate for the actual Tandem Switch usage shall apply. The UNE Local Call Flows set forth on BellSouth's website, as amended from time to time and incorporated herein by this reference, illustrate when the full or melded Tandem Switching rates apply for specific scenarios.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Local Switching 4.1.1 BellSouth shall provide non-discriminatory access to local circuit switching capability, and local tandem switching capability, on an unbundled basis, except as set forth below in Section 4.1.

  • Switching All of the negotiated rates, terms and conditions set forth in this Section pertain to the provision of local and tandem switching.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Network Upgrades The Transmission Owner shall design, procure, construct, install, and own the Network Upgrades described in Attachment 6 of this Agreement. If the Transmission Owner and the Interconnection Customer agree, the Interconnection Customer may construct Network Upgrades that are located on land owned by the Interconnection Customer. Unless the Transmission Owner elects to pay for Network Upgrades, the actual cost of the Network Upgrades, including overheads, shall be borne initially by the Interconnection Customer.

  • Unbundled Network Element Combinations 5.1. Unbundled Network Element Combinations shall include: 1) Enhanced Extended Links (EELs); 2) UNE Loops/Special Access Combinations; 3) Loop/Port Combinations; and 4)

  • Reducing Text Messaging While Driving Pursuant to Executive Order 13513, 74 FR 51225 (Oct. 6, 2009), Recipient should encourage its employees, subrecipients, and contractors to adopt and enforce policies that ban text messaging while driving, and Recipient should establish workplace safety policies to decrease accidents caused by distracted drivers.

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!