Log Review Sample Clauses

Log Review. All systems processing and/or storing DBH PHI or PI must have a routine procedure in place to review system logs for unauthorized access.
AutoNDA by SimpleDocs
Log Review. RN-15/IDDP-2 was drilled in 168 days, from 11/08/16 to 25/01/17, with a final measured depth of 4659 m (Xxxxxxxxxxxx et al., 2017). During the drilling process, several temperature logs were run while injecting water to cool down the equipment in the borehole. HS ORKA, mid Jan. 17, provided the log files listed in Table 9 and associated information. Table 9: Characteristics of the RN-15/IDDP-2 temperature logs available. The log direction is either down-going (D) or up-going (U). Log ID Date Max depth Flow rate Direction Drilling day Well TD (m MD) (L/s) (m MD) L5 03/10/16 3160 20 D + U 54 3178 L6 20/10/16 3340 25 D + U 71 3342 L7a 27/10/16 3441 10 D 78 3648 L7b 28/10/16 3648 20 D + U 79 3648 L8 09/11/16 3393 20 D 91 3865 L10a 03/01/17 4560 40 D + U 146 4626 L10b 03/01/17 2000 15 D + U 146 4626 Figure 10 shows all available temperature log profiles and discriminates between down- going (D) and up-going (U) measurements. L10a is the only log reaching the deepest part of RN-15/IDDP-2 (4626 m MD). All other logs stop shallower, most of them close to the first major feed zone at 3350 – 3380 m MD (Xxxxxxxxxxxx et al., 2017). As better shown in Figure 10 inset, the raw data consistently exhibit lower temperature measured in the well for larger injection flow rate during logging. One exception is observed for L5d, whose injection rate during logging was 20 L/s, like L7b or L8. These differences may be due to several factors such as the different dates of logging, the well total depth at the logging time and the injection flow rate applied before logging (10 L/s prior to L5d logging, but 14 L/s prior to L7b and L8 logging). From this series of temperature logs, the down-going measurements of L8 and L10a were taken to perform the inversion of the static formation temperature. Both logs cover the first 3350 m of the well. We did not analyze the other logs because they were either up-going measurements or critical for the following reasons: L5d: there may be an issue with the depth reference, as highlighted by the temperature gradient profile ( • Figure 11), which seems shifted ~100 m deeper than the other logs (L5u, L7b, L8, L10a). This is particularly visible for the low temperature gradient zone between 2400 m and 2500 m. • L6d: anomalous temperature profile down to ~1000 m. • L7a: anomalous measurement, noisy. • L7b: profile similar to L8. • L10b: logging not deeper than 2000 m. In parts, several of these logs could however be the subject of further investigation...

Related to Log Review

  • Log Reviews All systems processing and/or storing PHI COUNTY discloses to 11 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 12 must have a routine procedure in place to review system logs for unauthorized access.

  • Program Review The Contracting Officer or other authorized government representative may hold semi- annual program review meetings. Such meetings will be held via telecom or video teleconferencing. However, the Government reserves the right to request a meeting in person. The meetings will include all BPA holders, representatives from prospective customer agencies, a combination of current and prospective customer agencies, or individual BPA holders. Some Federal Government Agencies and any approved State, Local and Tribal agencies may establish a central program management function. Such users may require their primary suppliers to participate in agency program review meetings on a periodic basis, at no additional cost to the Government.

  • Utilization Review We review health services to determine whether the services are or were Medically Necessary or experimental or investigational ("Medically Necessary"). This process is called Utilization Review. Utilization Review includes all review activities, whether they take place prior to the service being performed (Preauthorization); when the service is being performed (concurrent); or after the service is performed (retrospective). If You have any questions about the Utilization Review process, please call the number on Your ID card. The toll-free telephone number is available at least 40 hours a week with an after-hours answering machine. All determinations that services are not Medically Necessary will be made by: 1) licensed Physicians; or 2) licensed, certified, registered or credentialed health care professionals who are in the same profession and same or similar specialty as the Provider who typically manages Your medical condition or disease or provides the health care service under review. We do not compensate or provide financial incentives to Our employees or reviewers for determining that services are not Medically Necessary. We have developed guidelines and protocols to assist Us in this process. Specific guidelines and protocols are available for Your review upon request. For more information, call the number on Your ID card or visit Our website at xxx.xxxxxxx.xxx.

  • Personnel File Review a. A unit member has the right upon his/her own request to review the contents of his/her personnel file. The review will be conducted in the presence of the administrator, or his/her designee, responsible for the safekeeping of such file. The employee may have a committee person assist in said review. Such review shall be conducted at a mutually agreeable time. A copy of requested material will be provided.

  • Project Review A. Programmatic Allowances

  • Post Review With respect to each contract not governed by paragraph 2 of this Part, the procedures set forth in paragraph 4 of Appendix 1 to the Guidelines shall apply.

  • Independent Review Contractor shall provide the Secretary of ADS/CIO an independent expert review of any Agency recommendation for any information technology activity when its total cost is $1,000,000.00 or greater or when CIO requires one. The State has identified two sub-categories for Independent Reviews, Standard and Complex. The State will identify in the SOW RFP the sub-category they are seeking. State shall not consider bids greater than the maximum value indicated below for this category. Standard Independent Review $25,000 Maximum Complex Independent Review $50,000 Maximum Per Vermont statute 3 V.S.A. 2222, The Secretary of Administration shall obtain independent expert review of any recommendation for any information technology initiated after July 1, 1996, as information technology activity is defined by subdivision (a) (10), when its total cost is $1,000,000 or greater or when required by the State Chief Information Officer. Documentation of this independent review shall be included when plans are submitted for review pursuant to subdivisions (a)(9) and (10) of this section. The independent review shall include: • An acquisition cost assessment • A technology architecture review • An implementation plan assessment • A cost analysis and model for benefit analysis • A procurement negotiation advisory services contract • An impact analysis on net operating costs for the agency carrying out the activity In addition, from time to time special reviews of the advisability and feasibility of certain types of IT strategies may be required. Following are Requirements and Capabilities for this Service: • Identify acquisition and lifecycle costs; • Assess wide area network (WAN) and/or local area network (LAN) impact; • Assess risks and/or review technical risk assessments of an IT project including security, data classification(s), subsystem designs, architectures, and computer systems in terms of their impact on costs, benefits, schedule and technical performance; • Assess, evaluate and critically review implementation plans, e.g.: • Adequacy of support for conversion and implementation activities • Adequacy of department and partner staff to provide Project Management • Adequacy of planned testing procedures • Acceptance/readiness of staff • Schedule soundness • Adequacy of training pre and post project • Assess proposed technical architecture to validate conformance to the State’s “strategic direction.” • Insure system use toolsets and strategies are consistent with State Chief Information Officer (CIO) policies, including security and digital records management; • Assess the architecture of the proposed hardware and software with regard to security and systems integration with other applications within the Department, and within the Agency, and existing or planned Enterprise Applications; • Perform cost and schedule risk assessments to support various alternatives to meet mission need, recommend alternative courses of action when one or more interdependent segment(s) or phase(s) experience a delay, and recommend opportunities for new technology insertions; • Assess the architecture of the proposed hardware and software with regard to the state of the art in this technology. • Assess a project’s backup/recovery strategy and the project’s disaster recovery plans for adequacy and conformance to State policy. • Evaluate the ability of a proposed solution to meet the needs for which the solution has been proposed, define the ability of the operational and user staff to integrate this solution into their work.

Time is Money Join Law Insider Premium to draft better contracts faster.