Corrective Measures If the Participating Generator fails to meet or maintain the requirements set forth in this Agreement and/or the CAISO Tariff, the CAISO shall be permitted to take any of the measures, contained or referenced in the CAISO Tariff, which the CAISO deems to be necessary to correct the situation.
Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.
Provisional Measures Article 50
General Measures (a) Evidence of family violence may be required and can be in the form an agreed document issued by the Police Service, a Court, a registered health practitioner, a Family Violence Support Service, district nurse, maternal and child health nurse or Lawyer. A signed statutory declaration can also be offered as evidence.
Other Measures 1. A Contracting Party may not require that an enterprise of that Contracting Party that is an investment under this Agreement appoint to senior management positions individuals of any particular nationality.
Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.
Remedial Measures Upon becoming aware of an alleged security breach, Contractor’s Contract Manager must set up a conference call with the Department’s and the Customer’s Contract Manager. The conference call invitation must contain a brief description of the nature of the event. When possible, a thirty (30)- minute notice will be given to allow Department personnel to be available for the call. If the designated time is not practical for the Customer, an alternate time for the call will be scheduled. Contractor must share all available information on the call. The Contractor must answer all questions based on the information known at that time and answer additional questions as additional information becomes known. The Contractor must provide the Department and Customer with final documentation of the incident including all actions that took place. If the Contractor becomes aware of a security breach or security incident outside of normal business hours, the Contractor must notify the Department’s and the Customer’s Contract Manager and in all events, within one business day.
Measures SAP protects its assets and facilities using the appropriate means based on the SAP Security Policy • In general, buildings are secured through access control systems (e.g., smart card access system). • As a minimum requirement, the outermost entrance points of the building must be fitted with a certified key system including modern, active key management. • Depending on the security classification, buildings, individual areas and surrounding premises may be further protected by additional measures. These include specific access profiles, video surveillance, intruder alarm systems and biometric access control systems. • Access rights are granted to authorized persons on an individual basis according to the System and Data Access Control measures (see Section 1.2 and 1.3 below). This also applies to visitor access. Guests and visitors to SAP buildings must register their names at reception and must be accompanied by authorized SAP personnel. • SAP employees and external personnel must wear their ID cards at all SAP locations.