Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Electrical appliance safety The Hirer shall ensure that any electrical appliances brought by them to the premises and used there shall be safe, in good working order, and used in a safe manner in accordance with the Electricity at Work Regulations 1989. Where a residual circuit breaker is provided the hirer must make use of it in the interests of public safety.
Fuel The Vehicle must be returned with the amount of fuel equal to that at the time of the commencement of the rental. If the Vehicle is returned with less fuel, the difference will be charged to You at a rate of $5.00 per litre (which includes a service component).
Gas If Customer has selected a Gas Fixed Rate, Customer’s Price will be based on the Fixed Rate(s), plus the Administration Charge, set forth in the Application, which includes RITERATE ENERGY’s compressor fuel and transportation charges, administrative and transaction costs and the Gas Balancing Amount and any Regulatory Charges (defined below).
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
DISTRIBUTION OF CONTRACTOR PRICE LIST AND CONTRACT APPENDICES Contractor shall provide Authorized Users with electronic copies of the Contract, including price lists and Appendices, upon request. Contract Updates will be handled as provided in Appendix C – Contract Modification Procedures.
Natural Gas 21.1 Subject to Article 21.2, the Indian domestic market shall have the first call on the utilisation of Natural Gas discovered and produced from the Contract Area. Accordingly, any proposal by the Contractor relating to Discovery and production of Natural Gas from the Contract Area shall be made in the context of the Government's policy for the utilisation of Natural Gas and shall take into account the objectives of the Government to develop its resources in the most efficient manner and to promote conservation measures. 21.2 The Contractor shall have the right to use Natural Gas produced from the Contract Area for the purpose of Petroleum Operations including reinjection for pressure maintenance in Oil Fields, gas lifting and captive power generation required for Petroleum Operations. 21.3 For the purpose of sales in the domestic market pursuant to this Article 21, the Contractor shall have freedom to market the Gas and sell its entitlement.
Contract Closure Contracting Officer shall give appropriate written notice to Purchaser when Purchaser has complied with the terms of this contract. Purchaser shall be paid refunds due from Timber Sale Account un- der B4.24 and excess cooperative deposits under B4.218.
Voltage Regulators Whenever the Large Generating Facility is operated in parallel with the New York State Transmission System, the automatic voltage regulators shall be in automatic operation at all times. If the Large Generating Facility’s automatic voltage regulators are not capable of such automatic operation, the Developer shall immediately notify NYISO, or its designated representative, and ensure that such Large Generating Facility’s real and reactive power are within the design capability of the Large Generating Facility’s generating unit(s) and steady state stability limits and NYISO system operating (thermal, voltage and transient stability) limits. Developer shall not cause its Large Generating Facility to disconnect automatically or instantaneously from the New York State Transmission System or trip any generating unit comprising the Large Generating Facility for an under or over frequency condition unless the abnormal frequency condition persists for a time period beyond the limits set forth in ANSI/IEEE Standard C37.106, or such other standard as applied to other generators in the New York Control Area on a comparable basis.
Plant The expression ‘Plant’ as used in the tender papers shall mean every temporary accessory necessary or considered necessary by the Engineer to execute, construct, complete and maintain the work and all altered, modified, substituted and additional works ordered in the time and the manner herein provided and all temporary materials and special and other articles and appliance of every sort kind and description whatsoever intended or used therefore.