PROPULSION SYSTEMS DESIGNATION AND THRUST CHANGES Sample Clauses

PROPULSION SYSTEMS DESIGNATION AND THRUST CHANGES. 3.1 Following the change of designation by CFM of the “LEAP-X” engine, the Parties hereby agree that any reference to “LEAP-X” Propulsion System in the Agreement will be deemed to be a reference to “LEAP” Propulsion System and that the following CFM engines denomination will apply. LEAP-1A26 for A320-200 NEO LEAP-1A26E1 for A320-200 NEO LEAP-1A32 for A321-200 NEO 3.2 LEAP-1A32B1, LEAP-1A32B2 and LEAP-1A33 The Parties agree to delete all references and associated pricing to LEAP-X1A32B1 or LEAP-1A32B2, as well as Leap-X1A32B2 or Leap 1A32B2 Propulsion Systems, in Clauses 2.3 and 3.1.2.1 of the Agreement as well as in Clause 1 of Exhibit C Part 2. The Parties agree to add the new LEAP-1A33 Propulsion System for A321 NEO Aircraft. 3.3 The Parties hereby agree that the table in Clause 2.3 of the Agreement will be entirely deleted and replaced by the following quoted table: A320-200N PW1127G-JM AET* (26,800 lbf) LEAP-1A26 AET* (26,600 lbf) or * Confidential material omitted and filed separately with the Securities and Exchange Commission pursuant to a request for confidential treatment. Ref. CLC-CT1243367July 2014 A321-200 NEO PW1133G-JM AET* (32,700 lbf) LEAP-1A32 AET* (32,100 lbf) or LEAP-1A33 AET* (32,900 lbf)
AutoNDA by SimpleDocs

Related to PROPULSION SYSTEMS DESIGNATION AND THRUST CHANGES

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.

  • Contract Changes Changes may not be made in the terms and conditions of this contract without the agreement and written permission of the Director of Residence Life or the Director’s designee.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Substitution of Key Personnel Consultant has represented to City that certain key personnel will perform and coordinate the Services under this Agreement. Should one or more of such personnel become unavailable, Consultant may substitute other personnel of at least equal competence upon written approval of City. In the event that City and Consultant cannot agree as to the substitution of key personnel, City shall be entitled to terminate this Agreement for cause. As discussed below, any personnel who fail or refuse to perform the Services in a manner acceptable to the City, or who are determined by the City to be uncooperative, incompetent, a threat to the adequate or timely completion of the Project or a threat to the safety of persons or property, shall be promptly removed from the Project by the Consultant at the request of the City. The key personnel for performance of this Agreement are as follows: Xxxxx Xxxxx.

  • Master Feeder Structure If permitted by the 1940 Act, the Board of Trustees, by vote of a majority of the Trustees, and without a Shareholder vote, may cause the Trust or any one or more Series to convert to a master feeder structure (a structure in which a feeder fund invests all of its assets in a master fund, rather than making investments in securities directly) and thereby cause existing Series of the Trust to either become feeders in a master fund, or to become master funds in which other funds are feeders.

  • Replacement of Key Personnel The Engineer must notify the State in writing as soon as possible, but no later than three business days after a project manager or other key personnel is removed from association with this contract, giving the reason for removal.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • PRICING STRUCTURES Licenses and Support Services for the Licensed Programs to which this OST applies are granted according to the pricing structures mentioned in the related Transaction Document. Standard pricing structures are defined in the section “DEFINITIONS” of this OST, even though those pricing structures may not be applicable to the DS Offerings to which this OST applies. Other pricing structures may be made available on a case by case basis.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!