Bus Surveillance Cameras Sample Clauses

Bus Surveillance Cameras. Cameras are not to be used as a supervisory tool and the District agrees that they will not use the cameras to observe employees without just cause.
AutoNDA by SimpleDocs

Related to Bus Surveillance Cameras

  • Video Surveillance All video surveillance will be directed by the YSU police department.

  • Surveillance The COR will receive and document all complaints from Government personnel regarding the services provided. If appropriate, the COR will send the complaints to the Contractor for corrective action.

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Cameras NSP items may only be acquired through the Contractor(s) or their Authorized Dealer(s) and must be reported quarterly with all other sales under the resulting Master Agreement(s). NSP items must be priced at a minimum discount of 15% from MSRP or List Price. NSP items shall not be offered to a Purchasing Entity as a stand-alone option, and the maximum allowable amount of all NSP items in a single Order shall be determined by the Participating State or Entity.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity 1.1.02 Identify at least one individual to act as the program contact in the following areas: 1. Immunization Program Manager;

  • Secondary Market Trading and Standard & Poor’s If the Company does not maintain the listing of the Public Securities on Nasdaq or another national securities exchange, the Company will (i) apply to be included in Standard & Poor’s Daily News and Corporation Records Corporate Descriptions for a period of five years from the consummation of a Business Combination, (ii) take such commercially reasonable steps as may be necessary to obtain a secondary market trading exemption for the Company’s securities in the State of California and (iii) take such other action as may be reasonably requested by the Representative to obtain a secondary market trading exemption in such other states as may be requested by the Representative; provided that no qualification shall be required in any jurisdiction where, as a result thereof, the Company would be subject to service of general process or to taxation as a foreign corporation doing business in such jurisdiction.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!