Interrogation Unit Sample Clauses

Interrogation Unit. (A) An IU, such as a Hand-held Unit (“HHU”) may be used for programming, commissioning, maintenance, fault finding and the retrieval of stored metering data. The metering data retrieved by the IU should be compatible with the Instation.
AutoNDA by SimpleDocs
Interrogation Unit. The Outstation shall be capable of being interrogated by an Interrogation Unit. The Interrogation Unit may be used for programming, commissioning, maintenance/fault finding and when necessary the retrieval of stored metering data. The data retrieved by the Interrogation Unit shall be compatible with the Settlement Instation.
Interrogation Unit. The Outstation shall be capable of being interrogated by an Interrogation Unit. The Interrogation Unit may be used for programming, commissioning, maintenance/fault finding and when necessary the retrieval of stored metering data. The data retrieved by the Interrogation Unit shall be compatible with the Settlement Instation. The Interrogation Unit shall have a built-in security system, such as a password so that the Interrogation Unit becomes inoperative and non- interrogatable if it is lost, stolen, etc.. The password can be applied at power-on of the device and/or on entry to the Interrogation Unit software application.
Interrogation Unit. The Operator may interrogate the Metering Equipment using an Interrogation Unit (IU). The Interrogation Unit may be used for programming, commissioning, maintenance/fault finding and when necessary the retrieval of stored metering data. The data retrieved by the Interrogation Unit shall be compatible with the Settlement Instation. The IU shall have a built-in security system, such as a password, so that the IU becomes inoperative and non-interrogatable if it is lost, stolen, etc.. The password can be applied at power-on of the device and/or on entry to the IU software application.

Related to Interrogation Unit

  • Emergency Escalation initiated by ICANN Upon reaching 10% of the Emergency thresholds as described in Section 6 of this Specification, ICANN’s emergency operations will initiate an Emergency Escalation with the relevant Registry Operator. An Emergency Escalation consists of the following minimum elements: electronic (i.e., email or SMS) and/or voice contact notification to the Registry Operator’s emergency operations department with detailed information concerning the issue being escalated, including evidence of monitoring failures, cooperative trouble-­‐shooting of the monitoring failure between ICANN staff and the Registry Operator, and the commitment to begin the process of rectifying issues with either the monitoring service or the service being monitoring.

  • Cost Overruns The Borrower shall ensure that all cost-overruns over the estimated construction costs of the Project as certified by a quantity surveyor or the Architect or as ascertained by the Lender as and when they occur shall be funded by the Borrower’s own equity;

  • Emergency Escalation Escalation is strictly for purposes of notifying and investigating possible or potential issues in relation to monitored services. The initiation of any escalation and the subsequent cooperative investigations do not in themselves imply that a monitored service has failed its performance requirements. Escalations shall be carried out between ICANN and Registry Operators, Registrars and Registry Operator, and Registrars and ICANN. Registry Operators and ICANN must provide said emergency operations departments. Current contacts must be maintained between ICANN and Registry Operators and published to Registrars, where relevant to their role in escalations, prior to any processing of an Emergency Escalation by all related parties, and kept current at all times.

  • Review of legality and data minimisation (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e).

  • Name Collision Occurrence Assessment 6.2.1 Registry Operator shall not activate any names in the DNS zone for the Registry TLD except in compliance with a Name Collision Occurrence Assessment provided by ICANN regarding the Registry TLD. Registry Operator will either (A) implement the mitigation measures described in its Name Collision Occurrence Assessment before activating any second-­‐level domain name, or (B) block those second-­‐level domain names for which the mitigation measures as described in the Name Collision Occurrence Assessment have not been implemented and proceed with activating names that are not listed in the Assessment.

  • Emergency Thresholds The following matrix presents the emergency thresholds that, if reached by any of the services mentioned above for a TLD, would cause the emergency transition of the Registry for the TLD as specified in Section 2.13 of this Agreement. Critical Function Emergency Threshold DNS Service (all servers) 4-hour total downtime / week DNSSEC proper resolution 4-hour total downtime / week EPP 24-hour total downtime / week RDDS (WHOIS/Web-based WHOIS) 24-hour total downtime / week Data Escrow Breach of the Registry Agreement as described in Specification 2, Part B, Section 6.

Time is Money Join Law Insider Premium to draft better contracts faster.