C2 Link - the Command and Control Sample Clauses

C2 Link - the Command and Control. (C2) link shows the current established means of communication for the selected unit with its next higher HQ in the chain of command. The left most position shows if there is a visual connection, the middle position shows if there is either voice or radio contact. The right most position is reserved for advanced communications present only in modern-day CMx2 titles. See chapter Command & Control later in the manual for more details.
AutoNDA by SimpleDocs

Related to C2 Link - the Command and Control

  • Open Source Assurance Program For Software that is Red Hat branded, purchases under this Agreement may entitle Client to participate in Red Hat’s Open Source Assurance Program which is described at xxxx://xxx.xxxxxx.xxx/rhel/details/assurance/. The terms for this optional program are subject to a separate agreement which can be viewed at xxxx://xxx.xxxxxx.xxx/legal/open_source_assurance_agreement.html.

  • Management of the Company The Company's business and affairs shall be conducted and managed by the Member(s) in accordance with this Agreement and the laws of the State of the Formation. Single-Member (Applies ONLY if Single-Member): The Member(s) of the Company has sole authority and power to act for or on behalf of the Company, to do any act that would be binding on the Company or incur any expenditures on behalf of the Company. The Member(s) shall not be liable for the debts, obligations, or liabilities of the Company, including under a judgment, decree, or order of a court. The Company is organized as a “member-managed” limited liability company. The Member(s) is designated as the initial managing Member(s). Multi-Member (Applies ONLY if Multi-Member): Except as expressly provided elsewhere in this Agreement, all decisions respecting the management, operation, and control of the business and affairs of the Company and all determinations made in accordance with this Agreement shall be made by the affirmative vote or consent of Member(s) holding a majority of the Members’ Percentage Interests. Notwithstanding any other provision of this Agreement, the Member shall not, without the prior written consent of the unanimous vote or consent of the Member(s), sell, exchange, lease, assign or otherwise transfer all or substantially all of the assets of the Company; sell, exchange, lease (other than space leases in the ordinary course of business), assign or transfer the Company’s assets; mortgage, pledge or encumber the Company’s assets other than is expressly authorized by this Agreement; prepay, refinance, modify, extend or consolidate any existing mortgages or encumbrances; borrow money on behalf of the Company; lend any Company funds or other assets to any person or entity; establish any reserves for working capital repairs, replacements, improvements or any other purpose; confess a judgment against the Company; settle, compromise or release, discharge or pay any claim, demand or debt, including claims for insurance; approve a merger or consolidation of the Company with or into any other limited liability company, corporation, partnership or other entity; or change the nature or character of the business of the Company. The Member(s) shall receive such sums for compensation as Member(s) of the Company as may be determined from time to time by the affirmative vote or consent of Member(s) holding a majority of the Member(s)’ Percentage Interests.

  • Verizon OSS Services Access to Verizon Operations Support Systems functions. The term “Verizon OSS Services” includes, but is not limited to: (a) Verizon’s provision of Z-Tel Usage Information to Z-Tel pursuant to Section 8.1.3 below; and, (b) “Verizon OSS Information”, as defined in Section 8.1.4 below.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Mobile Wireless Services Any mobile wireless Telecommunications Service, including any commercial mobile radio service.

  • Increasing Seat Belt Use in the United States Pursuant to Executive Order 13043, 62 FR 19217 (Apr. 18, 1997), Recipient should encourage its contractors to adopt and enforce on-the- job seat belt policies and programs for their employees when operating company-owned, rented or personally owned vehicles.

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Secondary / Post-Secondary Program Alignment Welding HIGH SCHOOL COURSE SEQUENCE 9th Grade 10th Grade 11th Grade 12th Grade English 9 Algebra I World History/Geography Biology World Language Phys Ed/Health English 10 Geometry U.S. History/Geography Physics or Chemistry World Language Visual/Performing/Applied Arts English 11 Algebra II Civics/Economics Welding English 12 Math Credit Science Credit Welding WASHTENAW COMMUNITY COLLEGE Welding Associate in Applied Science Semester 1 Math Elective(s)* 3 WAF 105 Introduction to Welding Processes 2 WAF 111 Oxy-fuel Welding 4 WAF 112 Shielded Metal Arc Welding 4 Semester Total 13 Semester 2 Speech Elective(s) 3 WAF 106 Blueprint Reading for Welders 3 WAF 123 Advanced Oxy-fuel Welding 4 WAF 124 Advanced Shielded Metal Arc Welding 4 Semester Total 14 Semester 3 Arts/Human. Elective(s) 3 Computer Lit. Elective(s) 3 WAF 215 Advanced Gas Tungsten Arc Welding 4 WAF 288 Gas Metal Arc Welding 4 Semester Total 14 Semester 4 WAF 200 Layout Theory Welding 3 WAF 210 Welding Metallurgy 3 Soc. Sci. Elective(s) 3 WAF 226 Specialized Welding Procedures 4 Semester Total 13 Semester 5 Nat. Sci. Elective(s) 4 WAF 227 Basic Fabrication 3 WAF 229 Shape Cutting Operations 3 Writing Elective(s) 3 Semester Total 13 Program Totals 67

  • Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

Time is Money Join Law Insider Premium to draft better contracts faster.