Parking Access and Revenue Control System (PARCS) Sample Clauses

Parking Access and Revenue Control System (PARCS). The Contractor shall operate the PARCS at the Airport as part of the Operating Equipment. The Contractor shall be responsible for the maintenance activities associated with the PARCS as defined by the Authority in Exhibit B-3. The Contractor will train its employees in the proper use of the Authority’s PARCS. The PARCS includes software and data contained therein that was developed at the Authority’s expense for use in the Contractor’s operations that is proprietary to the Authority. The Contractor shall not copy, assign, sell, or disclose the software or use the software for purposes that are not authorized by this Contract, except with the prior written approval of the Authority. At any time during the Contract Term, the Authority reserves the right to modify, and/or replace all or any part of the PARCS system at the Airport. Any such modification or replacement of the PARCS system by the Authority shall not alter or cancel the Contractor’s responsibility for the system’s operation and/or maintenance as provided herein unless otherwise provided in writing by the Authority. During the Contract Term the Authority may consolidate the system at Xxxxxx Xxxxx Washington National and Washington Dulles International Airports to provide a single consolidated system remotely hosted through the Authority’s data center; the Contractor shall support the Authority’s implementation efforts as directed by the Authority, which may require the Contractor to manage and operate certain consolidated parking systems for both airports.
AutoNDA by SimpleDocs

Related to Parking Access and Revenue Control System (PARCS)

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • CONTROL SYSTEM (a) SELLER shall provide and maintain a quality control system to an industry recognized Quality Standard and in compliance with any other specific quality requirements identified in this Contract.

  • Quality control system (i) The Contractor shall establish a quality control mechanism to ensure compliance with the provisions of this Agreement (the “Quality Assurance Plan” or “QAP”).

  • Union Access to Premises Representatives of the Union shall have access to the Company’s premises to carry on inspections or investigations pertaining to the terms and conditions of this Agreement, upon reasonable advance notice to the Company. Such access shall be carried on at reasonable hours and in such a manner so as not to interfere with the normal operations of the Company. The Union will advise the Company of its designated representatives who wish to gain access to the premises and the Union agrees to comply with all reasonable Company security precautions as may be in force from time to time.

  • Management and Control Systems Grantee will:

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

  • Building Access i. Access to Secured buildings: Contractor will work through the GIT Contract administrator for access to the building.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Emergency Operator Access Registry Operator shall provide bulk access to the zone files for the TLD to the Emergency Operators designated by ICANN on a continuous basis in the manner ICANN may reasonably specify from time to time.

  • BUILDING SERVICES CONTRACTS In compliance with Article 9, Section 230 of the New York State Labor Law:

Time is Money Join Law Insider Premium to draft better contracts faster.