Central Control System Sample Clauses

Central Control System. The building will have a control system to provide information on the state of the various systems at the central desk or at the building administration office. Alarms will show the situation of the systems and/or the control switches according to the following: elevators, air conditioning, car park lighting, smoke detection, sprinklers, diesel generator, drainage pumps, drainage and water supply and external lighting.
AutoNDA by SimpleDocs
Central Control System. A. The computerized central control system shall be the Rain Bird Cirrus as hereinafter specified. It shall be capable of controlling three (3) independent, 18-hole golf courses, plus one "other" area, each consisting of greens, tees, fairways, approaches, perimeters, roughs and miscellaneous areas. The central shall include the Rain Bird Cirrus Computer Assembly, a field hardware (Integrated Control) interface, an uninterruptible power supply rated at 980 Xxxxx or higher, a power circuit surge arrestor and a grounding network grid with surge arrestors, all as hereinafter specified.

Related to Central Control System

  • Monitoring System In each case in which the Custodian has exercised delegated authority to place Assets with a Foreign Custodian, the Custodian shall establish a system, to re-assess or re-evaluate selected Foreign Custodians, at least annually in accordance with Rule 17f-5(c)(3).

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Control Areas Tenant shall be allowed to utilize up to its pro rata share of the Hazardous Materials inventory within any control area or zone (located within the Premises), as designated by the applicable building code, for chemical use or storage. As used in the preceding sentence, Tenant’s pro rata share of any control areas or zones located within the Premises shall be determined based on the rentable square footage that Tenant leases within the applicable control area or zone. For purposes of example only, if a control area or zone contains 10,000 rentable square feet and 2,000 rentable square feet of a tenant’s premises are located within such control area or zone (while such premises as a whole contains 5,000 rentable square feet), the applicable tenant’s pro rata share of such control area would be 20%.

  • System Except as otherwise provided herein, the Trustee shall not be accountable for the use or application by the Company or the Master Servicer of any of the Certificates or of the proceeds of such Certificates, or for the use or application of any funds paid to the Company or the Master Servicer in respect of the Mortgage Loans or deposited in or withdrawn from the Custodial Account or the Certificate Account by the Company or the Master Servicer.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Operating Procedures The Service Provider intends to clear trades for Fund Shares through, and make use of, the National Securities Clearing Corporation’s (“NSCC’s”) Fund/Serv and, in connection therewith, agrees to follow and comply with the procedures, terms and conditions set forth in the operating procedures set forth in Exhibit A hereto, as supplemented or amended from time to time by the mutual agreement of the parties hereto (the “Operating Procedures”).

  • Standard Operating Procedures Over approximately the past eight years, the Parties have been supplying select Products to one another for use in the operation of their respective businesses within the United States of America, Canada and Mexico. The Parties developed and been following certain standard operating procedures in connecting with, among other topics, forecasting, production planning, ordering, delivering and resolving claims on the Products supplied to one another (the “Current SOPs”). The Parties will be updating their respective business systems over the next six months, and the updates to these business systems will require the Parties to modify the Current SOPs. Once the Parties have completed the updates to the business systems and agreed on the necessary modifications to the Current SOPs, the Parties will sign a written amendment to this Agreement appending the updated standard operating procedures (the “Updated SOPs”). Until the Parties have signed a written amendment appending the Updated SOPs, the parties will continue to follow the Current SOPs. The Parties will comply with the applicable SOPs in connection with the purchase and sale of products identified in a Purchase Schedule. The Parties may add terms and conditions to, and amend the terms and conditions of, the SOP in a Purchase Schedule, but any additional and amended terms and conditions in a Purchase Schedule supplementing and modifying the SOP will only apply the specific products identified in that Purchase Schedule for its duration.

  • Operational Control Directing the operation of the Transmission Facilities Under ISO Operational Control to maintain these facilities in a reliable state, as defined by the Reliability Rules. The ISO shall approve operational decisions concerning these facilities, made by each Transmission Owner before the Transmission Owner implements those decisions. In accordance with ISO Procedures, the ISO shall direct each Transmission Owner to take certain actions to restore the system to the Normal State. Operational Control includes security monitoring, adjustment of generation and transmission resources, coordination and approval of changes in transmission status for maintenance, determination of changes in transmission status for reliability, coordination with other Control Areas, voltage reductions and Load Shedding, except that each Transmission Owner continues to physically operate and maintain its facilities.

  • Monthly Reporting Within twenty (20) calendar days following the end of each calendar month, Registry Operator shall deliver to ICANN reports in the format set forth in Specification 3 attached hereto (“Specification 3”).

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

Time is Money Join Law Insider Premium to draft better contracts faster.