DETECTION DEVICE Sample Clauses

DETECTION DEVICE. The premises are equipped with a smoke detection device(s), which was tested and found operable by the Landlord. Landlord shall have a right to enter the premises to check and maintain the device as provided by law. Resident shall: a. be responsible for performing the manufacturer’s recommended test of the device weekly; b. inform the Landlord immediately in writing of any defect, malfunction, or failure of any detector, and of any problems, maintenance or need for repairs to Landlord. c. not disable, disconnect or remove the detector.
AutoNDA by SimpleDocs
DETECTION DEVICE. The rental unit is equipped with a smoke detection device(s), which was tested and found operable by the Landlord. Landlord shall have a right to enter the rental unit to check and maintain the device as provided by law. Resident shall: (a) be responsible for performing the manufacturer’s recommended test of the device weekly; (b) inform the Landlord immediately in writing of any defect, malfunction, or failure of any detector, and of any problems, maintenance or need for repairs to Landlord. (c) not disable, disconnect or remove the detector. (d) if battery operated, be responsible for changing the detector’s battery as necessary.
DETECTION DEVICE. The rental unit is equipped with a smoke detection device(s), which was tested and found operable by the Landlord. Landlord shall have a right to enter the rental unit to check and maintain the device as provided by law. Resident shall: (a) be responsible for performing the manufacturer’s recommended test of the device weekly; (b) inform the Landlord immediately in writing of any defect, malfunction, or failure of any detector, and of any problems, maintenance or need for repairs to Landlord. (c) not disable, disconnect or remove the detector.

Related to DETECTION DEVICE

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting DHCS PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • Random Drug Testing All employees covered by this Agreement shall be subject to random drug testing in accordance with Appendix D.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • SAMPLE (If applicable and the project has specifications, insert the specifications into this section.)

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case. 2. Nothing in this Article and Articles 25A to 25G shall affect the fulfilment of wider obligations with respect to the arbitration of unresolved issues arising in the context of a mutual agreement procedure resulting from other conventions to which the Contracting States are or will become parties.”.

  • Data Loss Prevention DST shall implement a data leakage program that is designed to identify, detect, monitor and document Fund Data leaving DST’s control without authorization in place.

  • RE-WEIGHING PRODUCT Deliveries are subject to re- weighing at the point of destination by the Authorized User. If shrinkage occurs which exceeds that normally allowable in the trade, the Authorized User shall have the option to require delivery of the difference in quantity or to reduce the payment accordingly. Such option shall be exercised in writing by the Authorized User.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!