Engine data Sample Clauses

Engine data. At the time of each shop visit, the Operator shall supply P&WC with the following information (as applicable) for the Engine, the Engine Modules and any time limited Accessories listed in Annex B: • Time Since New (TSN) • Cycle since new (CSN) • Time Since Repair (TSR) • Time Since Overhaul (TSO) • Cycle Since Overhaul (CSO) • Time Since Hot Section Inspection (TSHSI) • Reasons for Removal
AutoNDA by SimpleDocs
Engine data. At the time of each shop visit, Customer shall supply P&WC with the following information (as applicable) for the Engine, the Engine Modules or Components: • Time Since New (TSN) • Time Since Repair (TSR) • Time Since Overhaul (TSO) • Time Since Hot Section Inspection (TSHSI) • Reasons for Removal SB 14003 requires to track actual TSN & TSO for the following items: • Engine related accessories • Main Line Bearings # 1 & # 4 • First stage Sun Gear • PT blades, second stage
Engine data. With respect to these services, “Engine Data” shall be strictly limited to the following: ● Digital sensor data captured by a recording engine monitoring system installed in Aircraft and uploaded to the flight data repository of the Savvy online platform; ● Borescope images of engine cylinders captured in accordance with Savvy’s published borescope inspection protocol and uploaded to the borescope image repository of the Savvy online platform.
Engine data. At the time of each shop visit, Customer shall supply P&WC with the following information (as applicable) for the Engine, the Engine Modules or Components: • Time Since New (TSN) • Time Since Repair (TSR) The disclosure of this document is subject to the restrictions of Article 14.0 contained herein 10

Related to Engine data

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Metering Data At Developer’s expense, the metered data shall be telemetered to one or more locations designated by Connecting Transmission Owner, Developer and NYISO. Such telemetered data shall be used, under normal operating conditions, as the official measurement of the amount of energy delivered from the Large Generating Facility to the Point of Interconnection.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Domain Name Data 1.5.1 Query format: whois EXAMPLE.TLD 1.5.2 Response format:

  • Database File The Servicer will provide the Successor Servicer with a magnetic tape (in a format reasonably acceptable to the Indenture Trustee and the Servicer) containing the database file for each Contract (i) as of the Initial Cutoff Date, (ii) the Subsequent Cutoff Date, (iii) thereafter, as of the last day of the preceding Due Period on each Determination Date prior to a Service Transfer and (iv) on and as of the Business Day before the actual commencement of servicing functions by the Successor Servicer following the occurrence of a Service Transfer.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!