Perimeter wall of Computer Room Sample Clauses

Perimeter wall of Computer Room. To the extent that Tenant is willing to accept the Premises with a lesser degree of Landlord Tenant Improvements than is represented by the above list, Landlord will credit Tenant with a $19.60/month rent reduction for the 5 1/2 year Term for each $1,000 of cost savings to Landlord. Any additional Tenant Improvements for upgrades, hard wall partitioning, cabling, computer room improvements (other than the perimeter wall), et cetera are to be paid for by Tenant. At Tenant's request, Landlord will provide additional generic Tenant Improvements during the initial construction and then amortize the cost thereof into the Rent over the initial Lease Term. If not already completed, Tenant will immediately design a preliminary space plan to be mutually approved by Landlord and Tenant and incorporated into the Lease. Tenant and Landlord shall mutually agree on finishes including carpet colors, et cetera.
AutoNDA by SimpleDocs

Related to Perimeter wall of Computer Room

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • WINDOW CLEANING Tenant shall not clean, nor require, permit, suffer or allow any window in the Premises to be cleaned from the outside in violation of Section 202 of the Labor Law, or any other Requirement, or of the rules of the Board of Standards and Appeals, or of any other board or body having or asserting jurisdiction.

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Walls 12 Developer shall provide rustication patterns on all walls, except drainage headwalls, in Aesthetic 13 Area 3 in accordance with Exhibit L2.24 of the LAADCR. The final designs shall resemble these 14 simulations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!