Replacement Height Limits Sample Clauses

Replacement Height Limits. A Structure or Original Structure may be replaced with a Replacement Structure that is taller than the Original Structure. The total combined height of a Replacement Structure and any mounting devices shall be no greater than that allowed in Table 1, below. i. Guy poles. Guy poles are shorter than the utility poles they support. On Priority 1, 2, and 3 streets a guy pole may be replaced as if it is the same height as the pole it supports using Table 1, below. On Priority 4 streets a Guy pole can be replaced up to the height of the pole it supports. Example 1: A 20 foot guy pole that supports a 30 foot utility pole in a Priority 3 Street may be replaced as if it is 30’ tall. Therefore, it can be replaced with a pole 45 feet tall (30’ + 50% of 30’); Example 2: A 20 foot guy pole that supports a 30 foot utility pole in a Priority 4 Street may be replaced up to a maximum of 30 feet. ii. Skipped poles. There are Streets where runs of taller poles (typically high voltage transmission) and shorter poles (typically low voltage distribution or communication) are located on the same side of the Street. Where the shorter pole is situated adjacent and between two taller poles in the same run, the shorter pole is known as a “skipped pole.” A skipped pole may be replaced with a pole of the same height as the adjacent taller poles. Example: A 45 foot (45’) pole is situated adjacent and between two 65 foot (65’) poles on the same side of a Priority 4 Street. The 45’ pole can be replaced as if it were 65’ using Table 1, below. Therefore, it can be replaced with a pole 80 feet tall (65’ + 15’). If the 45’ pole is on the opposite side of the Priority 4 Street from the taller poles, it cannot be replaced as if it were 65’; it can only be replaced up to a height of 60 feet (45’ + 15’). Street Type Additional Height Priority 1 (freeways, highways, and streets in industrial areas) 80’ Priority 2 (high traffic volumes) Lesser of 40’ or 50% of the height of the pole Priority 3 (medium traffic volumes) Lesser of 35’ or 50% of the height of the pole Priority 4 (low traffic volumes; residential streets) Lesser of 15’ or 45% of the height of the pole
AutoNDA by SimpleDocs

Related to Replacement Height Limits

  • ADDITIONAL INSURED ENDORSEMENT AND PRIMARY AND NON-CONTRIBUTORY INSURANCE CLAUSE Supplier agrees to list Sourcewell and its Participating Entities, including their officers, agents, and employees, as an additional insured under the Supplier’s commercial general liability insurance policy with respect to liability arising out of activities, “operations,” or “work” performed by or on behalf of Supplier, and products and completed operations of Supplier. The policy provision(s) or endorsement(s) must further provide that coverage is primary and not excess over or contributory with any other valid, applicable, and collectible insurance or self-insurance in force for the additional insureds.

  • Acknowledgement and Consent to Bail-In of EEAAffected Financial Institutions Notwithstanding anything to the contrary in any Loan Document or in any other agreement, arrangement or understanding among any such parties, each party hereto acknowledges that any liability of any EEAAffected Financial Institution arising under any Loan Document, to the extent such liability is unsecured, may be subject to the write-down and conversion powers of an EEAthe applicable Resolution Authority and agrees and consents to, and acknowledges and agrees to be bound by: (a) the application of any Write-Down and Conversion Powers by an EEAthe applicable Resolution Authority to any such liabilities arising hereunder which may be payable to it by any party hereto that is an EEAAffected Financial Institution; and (b) the effects of any Bail-in Action on any such liability, including, if applicable: (i) a reduction in full or in part or cancellation of any such liability; (ii) a conversion of all, or a portion of, such liability into shares or other instruments of ownership in such EEAAffected Financial Institution, its parent undertaking, or a bridge institution that may be issued to it or otherwise conferred on it, and that such shares or other instruments of ownership will be accepted by it in lieu of any rights with respect to any such liability under this Agreement or any other Loan Document; or (iii) the variation of the terms of such liability in connection with the exercise of the write-down and conversion powers of any EEAthe applicable Resolution Authority.

  • Replacement of Banks If (i) any Bank requests compensation under Section 13.3, (ii) the obligation of any Bank to make SOFR Loans or continue Loans as SOFR Loans has been suspended pursuant to Section 13.4, (iii) Borrower is required to pay any Indemnified Taxes or additional amounts to any Bank or any Governmental Authority for the account of any Bank pursuant to Section 13.5 and, in each case, such Bank has declined or is unable to designate a different lending office in accordance with Section 13.7(a), or (iv) any Bank is a Defaulting Bank or a Non-Consenting Bank, then Borrower may, at its sole expense and effort, upon notice to such Bank and Administrative Agent, require such Bank to assign and delegate, without recourse (in accordance with and subject to the restrictions contained in, and consents required by, Section 14.8), all of its interests, rights (other than its existing rights to payments pursuant to Section 13.3 or Section 13.5) and obligations under this Agreement and the related Loan Papers to an eligible assignee that shall assume such obligations (which assignee may be another Bank, if a Bank accepts such assignment); provided that: (i) Borrower shall have paid to Administrative Agent the assignment fee (if any) specified in Section 14.8; (ii) such Bank shall have received payment of an amount equal to the outstanding principal of its Loans and participations in Letter of Credit Exposure, accrued interest thereon, accrued fees and all other amounts payable to it hereunder and under the other Loan Papers (including any amounts under Section 3.3) from the assignee (to the extent of such outstanding principal and accrued interest and fees) or Borrower (in the case of all other amounts); (iii) in the case of any such assignment resulting from a claim for compensation under Section 13.3 or payments required to be made pursuant to Section 13.5, such assignment will result in a reduction in such compensation or payments thereafter; (iv) in the case of any such assignment resulting from the suspension of an obligation to make SOFR Loans or continue Loans as SOFR Loans under Section 13.4, such assignment will result in a resumption of such obligation in whole or in part; (v) such assignment does not conflict with applicable Law; and (vi) in the case of any assignment resulting from a Bank becoming a Non-Consenting Bank, the applicable assignee shall have consented to the applicable amendment, waiver or consent. A Bank shall not be required to make any such assignment or delegation if, prior thereto, as a result of a waiver by such Bank or otherwise, the circumstances entitling Borrower to require such assignment and delegation cease to apply. Notwithstanding the foregoing, a Bank shall not be required to make any such assignment and delegation if such Bank is a Secured Hedge Provider with any outstanding Hedge Transaction with any Credit Party (to the extent obligations under such Hedge Transactions constitute Obligations), unless on or prior thereto, all such Hedge Transactions have been terminated or novated to another Person and such Bank (or its Affiliate) shall have received payment of all amounts, if any, payable to it in connection with such termination or novation. If any Bank refuses, pursuant to the previous sentence, to make any such assignment and delegation, such Bank shall give all reasonable cooperation to Borrower to effect such termination or novation of such Hedge Transactions.

  • Replacement of Key Personnel The Engineer must notify the State in writing as soon as possible, but no later than three business days after a project manager or other key personnel is removed from association with this contract, giving the reason for removal.

  • Acceptable Use Policy The Services must be used in accordance with RingCentral’s Acceptable Use Policy, available at xxxxx://xxx.xxxxxxxxxxx.xxx/legal/acceptable-use-policy.html. Notwithstanding anything to the contrary in this Agreement, RingCentral may act immediately and without notice to suspend or limit the Services if RingCentral reasonably suspects fraudulent or illegal activity in the Customer’s Account, material breach of the Acceptable Use Policy, or use of the Services that could interfere with the functioning of the RingCentral Network provided such suspension or limitation may only be to the extent reasonably necessary to protect against the applicable condition, activity, or use. RingCentral will promptly remove the suspension or limitation as soon as the condition, activity or use is resolved and mitigated in full. If Customer anticipates legitimate but unusual activity on its Account, Customer should contact Customer Care in advance to avoid any Service disruption.

  • Effect of Replacement In the event of the substitution of an Airframe or of a Replacement Engine pursuant to Section 10 of the Lease, all provisions of this Trust Indenture relating to the Airframe or Engine or Engines being replaced shall be applicable to such Replacement Airframe or Replacement Engine or Engines with the same force and effect as if such Replacement Airframe or Replacement Engine or Engines were the same airframe or engine or engines, as the case may be, as the Airframe or Engine or Engines being replaced but for the Event of Loss with respect to the Airframe or Engine or Engines being replaced.

  • Replacement of Parts Except as otherwise provided herein, so long as the Airframe or Engine is subject to the Lien of this Indenture, Owner, at its own cost and expense, will, or will cause a Permitted Lessee to, at its own cost and expense, promptly replace (or cause to be replaced) all Parts which may from time to time be incorporated or installed in or attached to the Aircraft, Airframe or any Engine and which may from time to time become worn out, lost, stolen, destroyed, seized, confiscated, damaged beyond repair or permanently rendered unfit for use for any reason whatsoever. In addition, Owner may, at its own cost and expense, or may permit a Permitted Lessee at its own cost and expense to, remove (or cause to be removed) in the ordinary course of maintenance, service, repair, overhaul or testing any Parts, whether or not worn out, lost, stolen, destroyed, seized, confiscated, damaged beyond repair or permanently rendered unfit for use; provided, however, that Owner, except as otherwise provided herein, at its own cost and expense, will, or will cause a Permitted Lessee at its own cost and expense to, replace such Parts as promptly as practicable. All replacement parts shall be free and clear of all Liens, except for Permitted Liens and pooling arrangements to the extent permitted by Section 4.04(c) below (and except in the case of replacement property temporarily installed on an emergency basis) and shall be in good operating condition and have a value and utility not less than the value and utility of the Parts replaced (assuming such replaced Parts were in the condition required hereunder).

  • Replacement Provider In the event the Agreement (or any portion thereof) is terminated in accordance with this Article II, the Sellers shall be responsible for engaging one or more qualified replacement providers of the Services of the Serviced Appointments that are subject to such termination (each, a “Replacement Provider”), which may be any Seller, any other member of the Seller Group or any third party acceptable to the Sellers. Upon request by the Sellers, the Purchasers shall provide the Sellers with reasonable assistance in marketing the Services subject to such termination to potential third party Replacement Providers, including by providing any information reasonably requested by the Sellers; provided, that any potential third party Replacement Provider shall have executed a customary confidentiality agreement before any confidential information of the Purchasers is disclosed by the Sellers to such potential third party Replacement Provider.

  • Replacement of Note 2.1 In the event that this Note is mutilated, destroyed, lost or stolen, Payor shall, at its sole expense, execute, register and deliver a new Note, in exchange and substitution for this Note, if mutilated, or in lieu of and substitution for this Note, if destroyed, lost or stolen. In the case of destruction, loss or theft, Payee shall furnish to Payor indemnity reasonably satisfactory to Payor, and in any such case, and in the case of mutilation, Payee shall also furnish to Payor evidence to its reasonable satisfaction of the mutilation, destruction, loss or theft of this Note and of the ownership thereof. Any replacement Note so issued shall be in the same outstanding principal amount as this Note and dated the date to which interest shall have been paid on this Note or, if no interest shall have yet been paid, dated the date of this Note. 2.2 Every Note issued pursuant to the provisions of Section 2.1 above in substitution for this Note shall constitute an additional contractual obligation of the Payor, whether or not this Note shall be found at any time or be enforceable by anyone.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!