Operating Structure & Protocols Sample Clauses

Operating Structure & Protocols. It is further agreed that command will be structured in accordance with the Incident Command System (ICS) of the National Incident Management System (NIMS), and that if the emergency/disaster is multi-jurisdictional, a Unified Command will be employed when practical. a. It is further agreed that when any personnel or equipment is deployed under the terms of this agreement, the authorized representative of the aiding municipality shall report to the requesting municipality’s authorized representative. Orders by the requesting municipality will be given to the aiding municipality who will then give orders or direction to their personnel and then remain in communication with the requesting municipality. The aiding municipality may be under the direct control of an officer of the requesting municipality only by mutual agreement. b. In all cases and at all times, the person in charge shall have the right and responsibility to ensure that all personnel are asked to perform only those tasks or operations that are consistent with their training and are in accordance with their home protocols and accepted safe practices. c. Visiting personnel shall remain under the control of “command” until the requesting municipality releases said personnel and equipment or until said personnel are recalled by the aiding municipality. Such personnel and equipment shall be released as soon as reasonably possible and returned to the aiding municipality. d. Lastly, it is agreed that each assisting emergency response organization will operate in accordance with its home district protocols and each emergency response person will operate according to the protocols of his/her own organization, and within the scope of his/her own training and certification, or under the supervision of a person with appropriate training and certification. In no event shall the aiding municipality be required to perform in a way inconsistent with their home protocols or inconsistent with accepted safe practices.
AutoNDA by SimpleDocs

Related to Operating Structure & Protocols

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Project Changes Project changes prior to bid opening shall be made by addendum to plans and specifications. Changes after bid opening shall be made by change order. The Local Government shall submit all addenda and all change orders to the Department for an eligibility determination. After execution of all construction, equipment and materials contracts, the Project contingency may be reduced.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Developer Attachment Facilities Developer shall design, procure, construct, install, own and/or control the Developer Attachment Facilities described in Appendix A hereto, at its sole expense.

  • Operating Plan To Agent and Lenders, as soon as available, but not later than thirty (30) days after the end of each Fiscal Year, an annual combined operating plan (the "Operating Plan") for Parent and its Subsidiaries, approved by the Board of Directors of Parent, for the following Fiscal Year, which (i) includes a statement of all of the material assumptions on which such plan is based, (ii) includes projected monthly income statement, balance sheets and source and use of funds for the following year and (iii) Borrowing Availability projections, all prepared on the same basis and in similar detail as that on which operating results are reported (and in the case of cash flow projections, representing management's good faith estimates of future financial performance based on historical performance), and including plans for personnel, Capital Expenditures and facilities.

  • Developer Operating Requirements The Developer must comply with the Transmission Owner’s operating instructions and requirements including but not limited to Transmission Owner’s Operation Coordination Agreement, as it may change from time to time. The Developer must comply with all applicable NYISO tariffs and procedures, as amended from time to time. Whether or not the Large Generating Facility is eligible for the Transition Period LVRT Standard set forth in Appendix G will be determined by the Commission. The Large Generating Facility will comply with the Transition Period LVRT Standard pending issuance of an order by the Commission determining the appropriate LVRT standard. For purposes of compliance with Appendix G, the Transmission Owner has determined that the Developer shall maintain the Large Generating Facility in service during a three-phase fault for 7 cycles. Infrastructure security of New York State Transmission System equipment and operations and control hardware and software is essential to ensure day-to-day New York State Transmission System reliability and operational security. The Commission will expect the NYISO, all Transmission Owners, all Developers and all other Market Participants to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities will be expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices. All personnel working in Transmission Owner’s facilities will require security background checks prior to entering and working in such facilities. New York Independent System Operator, Inc. Attn: Vice President, Operations 0000 Xxxxxx Xxxx Schenectady, NY 12303 Senior Vice President of Transmission New York Power Authority 000 Xxxx Xx. Xxxxx Xxxxxx, XX 00000-0000 Re: Large Generating Facility Dear : On [Date] [Developer] has completed Trial Operation of Unit No. . This letter confirms that [Developer] commenced Commercial Operation of Unit No. at the Large Generating Facility, effective as of [Date plus one day]. Thank you. NYISO:

  • Project Implementation The Borrower shall:

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!