Cyber Command & Control Sample Clauses

Cyber Command & Control. 4.1.5.1 Research, develop, enhance, integrate, demonstrate, experiment, and evaluate cyber C2 technologies and techniques to improve cyber C2 capabilities and integration of these capabilities with existing kinetic processes for Air Force systems. These technologies and techniques may address the following:
AutoNDA by SimpleDocs

Related to Cyber Command & Control

  • Construction Management Plan Contractor shall prepare and furnish to the Owner a thorough and complete plan for the management of the Project from issuance of the Proceed Order through the issuance of the Design Professional's Certificate of Material Completion. Such plan shall include, without limitation, an estimate of the manpower requirements for each trade and the anticipated availability of such manpower, a schedule prepared using the critical path method that will amplify and support the schedule required in Article 2.1.5 below, and the Submittal Schedule as required in Article 2.2.3. The Contractor shall include in his plan the names and resumés of the Project Superintendent, Project Manager and the person in charge of Safety.

  • Management Plan The Management Plan is the description and definition of the phasing, sequencing and timing of the major Individual Project activities for design, construction procurement, construction and occupancy as described in the IPPA.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Causes Beyond Control Neither party of this contract shall be held responsible for delay or default caused by fire, riot, acts of God, sovereign, public enemy, and/or war which is beyond that party's control. The STATE may terminate this contract upon written notice after determining such delay or default will reasonably prevent successful performance of the contract. In the event a cause or causes beyond control impact this contract, the STATE may grant a reasonable extension of time and shall not additionally compensate the PURCHASER.

  • Project Management Plan 1 3.4.1 Developer is responsible for all quality assurance and quality control 2 activities necessary to manage the Work, including the Utility Adjustment Work.

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

  • Utilization Management Contractor shall maintain a utilization management program that complies with applicable laws, rules and regulations, including Health and Safety Code § 1367.01 and other requirements established by the applicable State Regulators responsible for oversight of Contractor.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Fraud Control BellSouth will provide seven days per week, 24-hours per day, fraud monitoring on Calling Cards, xxxx-to-third and collect calls made to numbers in BellSouth’s LIDB, provided that such information is included in the LIDB query. BellSouth will establish fraud alert thresholds and will notify <<customer_name>> of fraud alerts so that <<customer_name>> may take action it deems appropriate.

Time is Money Join Law Insider Premium to draft better contracts faster.