Purpose of Remedial Measures Sample Clauses

Purpose of Remedial Measures. The Parties agree that the timely and efficient completion of the New Interconnection by Terna and of the Associated Network Infrastructures and, in the event that any of the Additional Network Infrastructures are developed by the Company as public infrastructure (and not as “private interconnector” in accordance with Electricity Regulations 714/2009 and 1228/2003), of at least one of the Additional Network Infrastructures by the Company are necessary for the proper realization of the Strategic Partnership and to justify the considerable investments being undertaken by Terna and the Company. To this end, the Parties agree that the measures set forth in this Article IV (collectively, the “Remedial Measures”) are necessary in order to ensure the successful and timely completion and commissioning of the New Interconnection, the Associated Network Infrastructures and, in the event that any of the Additional Network Infrastructures are developed by the Company as public infrastructure (and not as “private interconnector” in accordance with Electricity Regulations 714/2009 and 1228/2003), at least one of the Additional Network Infrastructures no later than June 30, 2014 (other than the Pljevlja- Tivat/Kotor Transmission Line which shall be completed and commissioned by the Company prior to October 31, 2015) by enforcing the deadlines relating to the intermediate milestones and sub-milestones set forth in Article II hereof.
AutoNDA by SimpleDocs

Related to Purpose of Remedial Measures

  • Remedial Measures Upon becoming aware of an alleged security breach, Contractor’s Contract Manager must set up a conference call with the Department’s and the Customer’s Contract Manager. The conference call invitation must contain a brief description of the nature of the event. When possible, a thirty (30)- minute notice will be given to allow Department personnel to be available for the call. If the designated time is not practical for the Customer, an alternate time for the call will be scheduled. Contractor must share all available information on the call. The Contractor must answer all questions based on the information known at that time and answer additional questions as additional information becomes known. The Contractor must provide the Department and Customer with final documentation of the incident including all actions that took place. If the Contractor becomes aware of a security breach or security incident outside of normal business hours, the Contractor must notify the Department’s and the Customer’s Contract Manager and in all events, within one business day.

  • Provisional Measures Article 50

  • Emergency Measures Additional measures and/or other special requirements necessary during periods of critical fire-weather conditions shall be included in the fire prevention and presuppression plan.

  • Corrective Measures If the Participating Generator fails to meet or maintain the requirements set forth in this Agreement and/or the CAISO Tariff, the CAISO shall be permitted to take any of the measures, contained or referenced in the CAISO Tariff, which the CAISO deems to be necessary to correct the situation.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Prudential Measures 1. Notwithstanding any other provisions of this Agreement, a Party shall not be prevented from taking measures relating to financial services for prudential reasons, including for the protection of investors, depositors, policy holders or persons to whom a fiduciary duty is owed by an enterprise supplying financial services, or to ensure the integrity and stability of its financial system. 2. Where measures mentioned in paragraph 1 do not conform to the provisions of this Agreement, they shall not be used as a means of avoiding the Party's commitments or obligations under this Agreement.

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference. Adherence to these accessible technology standards is one way to ensure compliance with the College’s underlying legal obligations to ensure that people with disabilities are able to acquire the same information, engage in the same interactions, and enjoy the same benefits and services within the same timeframe as their nondisabled peers, with substantially equivalent ease of use; that they are not excluded from participation in, denied the benefits of, or otherwise subjected to discrimination in any College programs, services, and activities delivered online, as required by Section 504 and the ADA and their implementing regulations; and that they receive effective communication of the College’s programs, services, and activities delivered online.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Compliance Measures The Contractor is required to price for Covid 19 compliance and the pricing thereof shall be deemed to include all the mandatory requirements. 110 F: ……….… V: ….……… T: ….……... Item

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

Time is Money Join Law Insider Premium to draft better contracts faster.