CONTROL AND AUTOMATION SYSTEM Sample Clauses

CONTROL AND AUTOMATION SYSTEM. A. The existing Xxxxxxx Controls building automation system shall be connected to the new building. The existing temperature control system shall be upgraded to the latest version web based Xxxxxxx Controls Metasys system to ensure compatibility and provide a single, web accessible dashboard for control and monitoring of the entire JVIC complex. B. The Temperature Controls Contractor shall provide Missouri State University with the location of all data jacks required to incorporate the building automation system into the campuswide Xxxxxxx Controls Metasys building automation system. This information shall be provided as early as possible but no later than at the time temperature control submittals are provided to the design team for review. C. The control and automation system shall consist of sensors, indicators, actuators, final control elements, interface equipment, other apparatus, accessories, and software connected to distributed controllers operating in multi-user, multi-tasking environment on token-passing network and programmed to control mechanical systems. Location of space sensors and other exposed control sensors will be coordinated with Architect. Supply of conditioned electrical circuits will be coordinated for control units and operator workstation. All control devices shall be designed for fail safe operation in the event of power failure. D. The Temperature Controls Contractor shall be a subcontractor to the General Contractor (rather than to the Mechanical Contractor). We have found this provides better communication and coordination between the Temperature Controls Contractor and the General Contractor. Core & Shell Plumbing System 4.1 CODE COMPLIANCE A. The design will comply with the following Codes and Standards:
AutoNDA by SimpleDocs

Related to CONTROL AND AUTOMATION SYSTEM

  • Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.

  • Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Secondary Systems The Developer and Connecting Transmission Owner shall each cooperate with the other in the inspection, maintenance, and testing of control or power circuits that operate below 600 volts, AC or DC, including, but not limited to, any hardware, control or protective devices, cables, conductors, electric raceways, secondary equipment panels, transducers, batteries, chargers, and voltage and current transformers that directly affect the operation of Developer or Connecting Transmission Owner’s facilities and equipment which may reasonably be expected to impact the other Party. The Developer and Connecting Transmission Owner shall each provide advance notice to the other Party, and to NYISO, before undertaking any work on such circuits, especially on electrical circuits involving circuit breaker trip and close contacts, current transformers, or potential transformers.

  • PayPal’s Buyer Protection Program When you buy something from a seller who accepts PayPal, you may be eligible for a refund under PayPal’s Buyer Protection program. When applicable, PayPal’s Buyer Protection program entitles you to reimbursement for the full purchase price of the item plus the original shipping costs you paid, if any. PayPal determines, in its sole discretion, whether your claim is eligible for PayPal’s Buyer Protection program. PayPal’s original determination is considered final, but you may be able to file an appeal of the decision with PayPal if you have new or compelling information not available at the time of the original determination or you believe there was an error in the decision-making process. The program terms and conditions are set out in PayPal’s Buyer Protection program page and form part of this user agreement.

  • Consent to Emails and Automated Text Messages By participating as a Zelle User, you represent that you are the owner of the email address, mobile phone number, and/or other alias you enroll, or that you have the delegated legal authority to act on behalf of the owner of such email address, mobile phone number and/or other alias to send or receive money as described in this Agreement. You consent to the receipt of emails or text messages from us, from Zelle, from other Users that are sending you money or requesting money from you, and from other Network Banks or their agents regarding the Zelle Service or related transfers between Network Banks and you. You agree that we, Zelle, or either of our agents may use automatic telephone dialing systems in connection with text messages sent to any mobile phone number you enroll. You further acknowledge and agree: ▪ You are responsible for any fees or other charges that your wireless carrier may charge for any related data, text or other message services, including without limitation for short message service. Please check your mobile service agreement for details or applicable fees. ▪ You will immediately notify us if any email address or mobile phone number you have enrolled is (i) surrendered by you, or (ii) changed by you. ▪ In the case of any messages that you may send through either us or Zelle or that we may send or Zelle may send on your behalf to an email address or mobile phone number, you represent that you have obtained the consent of the recipient of such emails or automated text messages to send such emails or text messages to the recipient. You understand and agree that any emails or text messages that we send or that Xxxxx sends on your behalf may include your name. ▪ Your wireless carrier is not liable for any delay or failure to deliver any message sent to or from us or Zelle, including messages that you may send through us or through Zelle or that we may send or Zelle may send on your behalf. ▪ To cancel text messaging from us, text STOP to 20736. For help or information regarding text messaging, text HELP to 20736 or contact our customer service at 0.000.000.0000 or 0.000.000.0000. You expressly consent to receipt of a text message to confirm your “STOP” request. ▪ Our Zelle notifications are supported by many carriers, such as AT&T, Verizon Wireless, T- Mobile, and Sprint. Check with your individual carrier to confirm availability. ▪ We or Zelle may use information on file with your wireless operator to further verify your identity and to protect against or prevent actual or potential fraud or unauthorized use of the Zelle Service. By using the Zelle Service, you authorize your wireless operator (AT&T, Sprint, T-Mobile, US Cellular, Verizon, or any other branded wireless operator) to disclose your mobile number, name, address, email, network status, customer type, customer role, billing type, mobile device identifiers (IMSI and IMEI) and other subscriber status and device details, if available, to our third party service provider solely to allow verification of your identity and to compare information you have provided to us or to Zelle with your wireless operator account profile information for the duration of our business relationship. See Xxxxx’x Privacy Policy [xxxxx://xxx.xxxxxxxx.xxx/privacy-policy] for how it treats your data. Please review our Privacy Policy for more information.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Disruption to Payment Systems etc If either the Agent determines (in its discretion) that a Disruption Event has occurred or the Agent is notified by the Company that a Disruption Event has occurred: (a) the Agent may, and shall if requested to do so by the Company, consult with the Company with a view to agreeing with the Company such changes to the operation or administration of the Facility as the Agent may deem necessary in the circumstances; (b) the Agent shall not be obliged to consult with the Company in relation to any changes mentioned in paragraph (a) if, in its opinion, it is not practicable to do so in the circumstances and, in any event, shall have no obligation to agree to such changes; (c) the Agent may consult with the Finance Parties in relation to any changes mentioned in paragraph (a) but shall not be obliged to do so if, in its opinion, it is not practicable to do so in the circumstances; (d) any such changes agreed upon by the Agent and the Company shall (whether or not it is finally determined that a Disruption Event has occurred) be binding upon the Parties as an amendment to (or, as the case may be, waiver of) the terms of the Finance Documents notwithstanding the provisions of Clause 39 (Amendments and Waivers); (e) the Agent shall not be liable for any damages, costs or losses whatsoever (including, without limitation for negligence, gross negligence or any other category of liability whatsoever but not including any claim based on the fraud of the Agent) arising as a result of its taking, or failing to take, any actions pursuant to or in connection with this Clause 33.11; and (f) the Agent shall notify the Finance Parties of all changes agreed pursuant to paragraph (d) above.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!