Reduction and Disconnection NYISO or Transmission Owner may reduce Network Access Interconnection Service or disconnect the Large Generating Facility or the Developer Attachment Facilities, when such, reduction or disconnection is necessary under Good Utility Practice due to an Emergency State. These rights are separate and distinct from any right of Curtailment of NYISO pursuant to the NYISO OATT. When NYISO or Transmission Owner can schedule the reduction or disconnection in advance, NYISO or Transmission Owner shall notify Developer of the reasons, timing and expected duration of the reduction or disconnection. NYISO or Transmission Owner shall coordinate with the Developer using Good Utility Practice to schedule the reduction or disconnection during periods of least impact to the Developer and the New York State Transmission System. Any reduction or disconnection shall continue only for so long as reasonably necessary under Good Utility Practice. The Parties shall cooperate with each other to restore the Large Generating Facility, the Attachment Facilities, and the New York State Transmission System to their normal operating state as soon as practicable consistent with Good Utility Practice.
Access and Disconnection 4.1 Distribution Licensee shall have access to metering equipment and disconnecting means of the Rooftop Solar Photovoltaic System, both automatic and manual, at all times.
Network Upgrades and Distribution Upgrades The Participating TO shall design, procure, construct, install, and own the Network Upgrades and Distribution Upgrades described in Appendix A. The Interconnection Customer shall be responsible for all costs related to Distribution Upgrades. Unless the Participating TO elects to fund the capital for the Distribution Upgrades and Network Upgrades, they shall be solely funded by the Interconnection Customer.
MAINTENANCE OF CLASSROOM CONTROL AND DISCIPLINE A. When, in the judgment of a teacher, a student is, by behavior, seriously disrupting the instructional program to the detriment of other students, the teacher may exclude the student temporarily from the classroom and refer the student to the building administrator for appropriate intervention. At the request of the referring teacher, an administrator will communicate the status of a disciplinary action within two (2) work days of the request.
Archival Back-Up and Disaster Recovery Licensee may use and copy the Product and related Documentation in connection with: i) reproducing a reasonable number of copies of the Product for archival backup and disaster recovery procedures in the event of destruction or corruption of the Product or disasters or emergencies which require Licensee to restore backup(s) or to initiate disaster recovery procedures for its platform or operating systems; ii) reproducing a reasonable number of copies of the Product and related Documentation for cold site storage. “Cold Site” storage shall be defined as a restorable back-up copy of the Product not to be installed until and after the declaration by the Licensee of a disaster; iii) reproducing a back-up copy of the Product to run for a reasonable period of time in conjunction with a documented consolidation or transfer otherwise allowed herein. “Disaster Recovery” shall be defined as the installation and storage of Product in ready-to-execute, back-up computer systems prior to disaster or breakdown which is not used for active production or development.
Permitted Uses and Disclosures of PHI 2.1 Unless otherwise limited herein, Business Associate may:
Effective Date Term Termination and Disconnection 3.1 Effective Date 3.2 Term of Agreement 3.3 Termination
Permitted Uses and Disclosures i. Business Associate shall use and disclose PHI only to accomplish Business Associate’s obligations under the Contract.
LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.