Sleeping Rooms to be Blocked A. The Contractor shall block sleeping rooms as set forth in Table 1, below. Date1 3 3 Date2 104 104 Total Rooms to be Blocked: 211 211 B. The Contractor will provide the Judicial Council with a current Delegate List/Report, after the Cut Off Date and before Date 1 of the Program, as identified in Exhibit B. The Judicial Council will then provide to the Contractor in writing an approved Master Account Approval List. The Contractor shall not bill the Judicial Council for Attendee reservations not included on the Master Account Approval List. Unless expressly set forth otherwise, any Individual Charges are the responsibility of the Attendee occupying the room. C. At the request of the Judicial Council, the Contractor shall block additional sleeping rooms for Attendees at the sleeping room rate specified above in this exhibit, provided that the additional sleeping rooms are available for rental during the Dates of the Program, at the time of the request. D. The Contractor shall provide the Judicial Council with a credit to the Master Account equal to the value of one (1) double occupancy sleeping room for each fifty (50) paid room nights during the Program:
Historic Preservation Subrecipient agrees to comply with the Historic Preservation requirements set forth in the National Historic Preservation Act of 1966, as amended (16 U.S.C. 470) and the procedures set forth in 36 CFR 800, Protection of Historic Properties, insofar as they apply to the performance of this Contract. In general, this requires concurrence from the State Historic Preservation Officer for all rehabilitation and demolition of historic properties that are fifty years old or older or that are included on a Federal, State, or local historic property list.
Software Installation The AGENCY shall request approval in writing from the COUNTY prior to installation of any software on COUNTY computer equipment. All software installations must be supervised by COUNTY technical support staff and proof of licensing is required. Upon completion, the AGENCY is responsible for reconfiguring the computers back to the original state.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.
Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.
Engine A. Any internal repairs or replacement of internal components, or replacement of engine assembly.
Aircraft This peril includes self-propelled missiles and spacecraft.
Engines POSITION SERIAL NO. TOTAL HOURS TOTAL CYCLES HRS/CYCLES SINCE LAST SHOP VISIT Time Remaining to Next LIFE LIMITED PART REMOVAL PART NAME HOURS CYCLES MSN MSN
Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.
Fleet In general, any in-house mechanic may be assigned to respond to any emergency during normal working hours in any of the three operating companies. (This does not supersede the Mechanic Personnel Working Across 309 Jurisdictional Boundaries Agreement dated October 4, 2007). Example 1: Lincoln (CILCO) unit breaks down in the northern part of its territory. It would make sense for the Bloomington (rp) mechanic to respond to the service call. Lincoln staffs a 2nd shift mechanic only and the vehicle in need of repair is closer to the Bloomington garage. This example covers areas that both have Ameren in-house mechanics. Example 2: Any CIPS 702 units could be repaired by Ameren staffed mechanics in 702 territories. This would generally happen in areas that are in close proximity to an IP or CILCO garage. This example covers 702 CIPS areas that do not have Ameren in-house mechanics. These jobs currently are outsourced. Perform Preventive Maintenance on CIPS 702 equipment at individual operating centers where advantageous. This work is currently outsourced. It is not the company’s intent to perform all PM’s with in-house mechanics.