Load securing Sample Clauses

Load securing. ‌ The logistics service provider must ensure that the transport containers meet the require- ments of the load, are in perfect condition and have a cleaned and absolutely dry loading area. When leaving or changing the loading point (2 or more loading points) or the loading hall, the entire loading area must be in closed condition. The aids required for securing the load, such as wedges, straps, mats, angles, etc., are to be provided exclusively by the logistics service provider. The load securing is the sole responsibility of the Contractor (and not the shipper) and must be carried out in accordance with the regulations VDI 2700 to 2702 (for truck transports), or ÖNORM V5750, 5751 and 5752. The Client shall under no circumstances assume any liability/responsibility whatsoever for the load securing to be carried out by the Contractor. See also Chapter 8 of the Supplementary Terms and Conditions of Purchase (EKB) for Logis- tics Services at xxxxx://xxx.xxxxxxx.xx/content/download/26572/file/EKB_LogS- erv_erg%C3%A4nzend%20zu%20AEB%20voestalpine.pdf .
AutoNDA by SimpleDocs
Load securing. ‌ The logistics service provider must ensure that the transport containers meet the require- ments of the load, are in perfect condition and have a cleaned and absolutely dry loading area. When leaving or changing the loading point (2 or more loading points) or the loading hall, the entire loading area must be in closed condition. The aids required for securing the load, such as wedges, belts, mats, angles, etc., are to be provided exclusively by the logistics service provider. The logistics service provider shall be solely responsible for securing the load and shall do so in accordance with the national regu- lations on load securing applicable in the respective country, equivalent to VDI 2700 to 2702 (for truck transports), or ÖNORM V5750, 5751 and 5752. Railroad: The respective loading tariff of the responsible railroad company must be observed.
Load securing. According to settled case law, as a carrier you are liable for reliable loading; you are also liable for your vicarious agent. The load must be secured by the driver properly and in accordance with the latest state of the art; you are responsible for the appropriate subsequent securing and the subsequent tensioning of the belts at the specified intervals. You must carry with you a sufficient number and suitable quality of the aids required for securing the load, such as lashing straps (min. 24) incl. long lever ratchet, edge protectors (also for paper rolls), nonslip mats, boards (Stecklatten), clipboards (min. 3 pcs.), chains, customs cable, etc. If the load securing equipment carried is not available in sufficient quantity or quality, it must be replaced at the expense of the contractor. The costs incurred for this will be charged to you plus a handling fee and will be deducted from open freight charges.
Load securing. ‌ The logistics service provider must ensure that the transport containers meet the require- ments of the load, are in perfect condition and have a cleaned and absolutely dry loading surface. The aids required for securing the load, such as wedges, straps, mats, angles, etc., are to be provided exclusively by the logistics service provider. The logistics service provider is solely responsible for securing the load and must do so in accordance with the national regulations on load securing applicable in the respective country, equivalent to VDI 2700 to 2702 (for truck transports), or ÖNORM V5750, 5751 and 5752. Railroad: The respective loading tariff of the responsible railroad company must be observed. Additional requirements for shimms see appendix 4: LogServ_loading_and_unload- ing_of_wagons

Related to Load securing

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!