Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Safety Glasses 10.3.1 Where a teacher is considered to be working in an “eye danger” area, the teacher shall receive a personal issue of standard neutral safety glasses which shall remain the property of the employer.
Brakes Master cylinder, wheel cylinders, hydraulic lines and fittings, power booster and brake callipers. Excludes linings, pads, drums and discs.
Fire Fighting Costs of operating and maintaining the fire-fighting equipments and personnel, if any.
Engine A. Any internal repairs or replacement of internal components, or replacement of engine assembly.
Firefighters Any truck with an inoperative aerial ladder shall be regularly and routinely staffed with one (1) officer and five (5) firefighters for the period of time that the aerial ladder is inoperative, or until such time as the truck with the inoperative aerial ladder is replaced with a truck with an operative aerial ladder. At 0800 and 2000 hours, all trucks shall be staffed with one (1) officer and four (4) firefighters, and any truck with an inoperative aerial ladder shall be staffed with one (1) officer and five (5) firefighters.
Rubric The rubrics are a scoring tool used for the Educator’s self-assessment, the formative assessment, the formative evaluation and the summative evaluation. The districts may use either the rubrics provided by ESE or comparably rigorous and comprehensive rubrics developed or adopted by the district and reviewed by ESE.
Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Moonlighting 24.01 The Company and the Union agree in principle to eliminate the practice commonly referred to as moonlighting.