Engine data Sample Clauses

Engine dataAt the time of each shop visit, the Operator shall supply P&WC with the following information (as applicable) for the Engine, the Engine Modules and any time limited Accessories listed in Annex B: • Time Since New (TSN) • Cycle since new (CSN) • Time Since Repair (TSR) • Time Since Overhaul (TSO) • Cycle Since Overhaul (CSO) • Time Since Hot Section Inspection (TSHSI) • Reasons for Removal
Engine dataAt the time of each shop visit, Customer shall supply P&WC with the following information (as applicable) for the Engine, the Engine Modules or Components: • Time Since New (TSN) • Time Since Repair (TSR) • Time Since Overhaul (TSO) • Time Since Hot Section Inspection (TSHSI) • Reasons for Removal SB 14003 requires to track actual TSN & TSO for the following items: • Engine related accessories • Main Line Bearings # 1 & # 4 • First stage Sun Gear • PT blades, second stage
Engine dataWith respect to these services, “Engine Data” shall be strictly limited to the following: ● Digital sensor data captured by a recording engine monitoring system installed in Aircraft and uploaded to the flight data repository of the Savvy online platform; ● Borescope images of engine cylinders captured in accordance with Savvy’s published borescope inspection protocol and uploaded to the borescope image repository of the Savvy online platform.
Engine dataAt the time of each shop visit, Customer shall supply P&WC with the following information (as applicable) for the Engine, the Engine Modules or Components: • Time Since New (TSN) • Time Since Repair (TSR) The disclosure of this document is subject to the restrictions of Article 14.0 contained herein 10

Related to Engine data

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Site Data (i) The Contractor shall be deemed to have inspected and examined the Site and its surroundings and to have satisfied himself before entering into the Agreement in all material respects including but not limited to: (a) the form and nature of the Site (including, inter-alia, the surface and sub- surface conditions and geo-technical factors); (b) the hydrological and climatic conditions; (c) the extent and nature of the works already completed and Materials necessary for the execution and completion of the Works and the remedying of any defects that includes already executed part also. (d) the suitability and the adequacy of the Site for the execution of the Works; (e) the means of access to the Site and the accommodation the Contractor may require; (f) arranging permits as required as per [.] of the Agreement. (g) the requirements of operation and maintenance; and (h) all other factors and circumstances affecting the Contractor's rights and obligations under the Agreement, the Contract Price and Time for Completion.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Engine A. Any internal repairs or replacement of internal components, or replacement of engine assembly.

  • Metering Data At Developer’s expense, the metered data shall be telemetered to one or more locations designated by Connecting Transmission Owner, Developer and NYISO. Such telemetered data shall be used, under normal operating conditions, as the official measurement of the amount of energy delivered from the Large Generating Facility to the Point of Interconnection.

  • Technical Data For the purpose of this Agreement, "TECHNICAL DATA" shall mean all information of the Company in written, graphic or tangible form relating to any and all products which are developed, formulated and/or manufactured by the Company, as such information exists as of the Effective Date or is developed by the Company during the term hereof.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format: