Excellent Above Average Satisfactory Needs Improvement Unsatisfactory 5 4 3 2 1 5. The instructor demonstrates knowledge of the subject matter.
Therapist Availability Therapist’s office is equipped with a confidential voice mail system that allows Patient to leave a message at any time. Therapist will make every effort to return calls within 24 hours (or by the next business day), but cannot guarantee the calls will be returned immediately. Therapist is unable to provide 24-hour crisis service. In the event that Patient is feeling unsafe or requires immediate medical or psychiatric assistance, he/she should call 911, or go to the nearest emergency room.
DNS name server availability Refers to the ability of a public-‐DNS registered “IP address” of a particular name server listed as authoritative for a domain name, to answer DNS queries from an Internet user. All the public DNS-‐registered “IP address” of all name servers of the domain name being monitored shall be tested individually. If 51% or more of the DNS testing probes get undefined/unanswered results from “DNS tests” to a name server “IP address” during a given time, the name server “IP address” will be considered unavailable.
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.
Utilization Scale STATE shall scale logs or portions of logs that are broken, wasted, or not removed by PURCHASER due to: (1) improper felling or bucking of the logs; (2) failure to remove the logs prior to deterioration; and (3) logs remaining on the timber sale area after completion of logging, provided the logs were merchantable prior to breakage or wastage. Material used to meet down material requirements in the section titled, "Reserved Timber," shall not be considered for utilization scale. PURCHASER shall pay for the logs at the contract price designated in Section 44. STATE shall notify PURCHASER of the volume of logs so scaled. Payment shall be considered due on such volume as if the logs were removed on the date of said notification. In the event PURCHASER disagrees with the findings made by STATE under this section, PURCHASER may furnish scaling by a third-party scaling organization acceptable to STATE. Costs and expenses of such third party shall be paid for by PURCHASER, and the findings of the third party shall be final.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Provisioning of High Frequency Spectrum and Splitter Space 3.2.1 BellSouth will provide <<customer_name>> with access to the High Frequency Spectrum as follows:
Synchronization, Commissioning and Commercial Operation 4.1.1 The Power Producer shall give at least thirty (30) days written notice to the SLDC and GUVNL, of the date on which it intends to synchronize the Power Project to the Grid System.
General Wage Increase Effective July 1, 2007, a general wage increase consisting of 2% was added to each grade and step of the pay plan(s) affecting the bargaining unit employees. Effective July 1, 2008, a general wage increase consisting of 2% will be added to each grade and step of the pay plan(s) affecting the bargaining unit employees.
Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.