SAFETY MONITORING SYSTEMS Sample Clauses

SAFETY MONITORING SYSTEMS. If a crew must work outside of the Controlled Access Zone and when no other alternative fall protection can feasibly be implemented, the crew will implement a safety monitoring system. This system may only be utilized on low-slope roofs. Crews must appoint a competent person to monitor the safety and will ensure that the safety monitor:
AutoNDA by SimpleDocs
SAFETY MONITORING SYSTEMS. When no other alternative fall protection has been implemented, the employer shall implement a safety monitoring system. Employers must appoint a competent person to monitor the safety of workers and the employer shall ensure that the safety monitor: • Is competent in the recognition of fall hazards; • Is capable of warning workers of fall hazard dangers and in detecting unsafe work practices; • Is operating on the same walking/working surfaces of the workers and can see them; • Is close enough to work operations to communicate orally with workers and has no other duties to distract from the monitoring function. Mechanical equipment shall not be used or stored in areas where safety monitoring systems are being used to monitor employees engaged in roofing operations on low-sloped roofs. No worker, other than one engaged in roofing work (on low-sloped roofs) or one covered by a fall protection plan, shall be allowed in an area where an employee is being protected by a safety monitoring system. All workers in a controlled access zone shall be instructed to promptly comply with fall hazard warnings issued by safety monitors. Safety Net Systems Safety nets must be installed as close as practicable under the walking/working surface on which employees are working and never more than 30 feet (9.1 meters) below such levels. Defective nets shall not be used. Safety nets shall be inspected at least once a week for wear, damage, and other deterioration. Safety nets shall be installed with sufficient clearance underneath to prevent contact with the surface or structure below. must be removed as soon as possible and at least before the next work shift. Warning Line Systems Warning line systems consist of ropes, wires, or chains, and supporting stanchions and are set up as follows: • Flagged at not more than 6-foot (1.8 meters) intervals with high-visibility material; • Rigged and supported so that the lowest point including sag) is no less than 34 inches (0.9 meters) from the walking/working surface and its highest point is no more than 39 inches (1 meter) from the walking/workingsurface. • Stanchions, after being rigged with warning lines, shall be capable of resisting, without tipping over, a force of at least 16 pounds (71 newtons) applied horizontally against the stanchion, 30 inches (0.8 meters) above the walking/working surface, perpendicular to the warning line and in the direction of the floor, roof, or platform edge; • The rope, wire, or chain shall have a mini...

Related to SAFETY MONITORING SYSTEMS

  • Quality Monitoring 4.2.1. To prepare a Quality Assurance (QA) Plan

  • Monitoring Services IDT staff shall, using methods that include face-to-face and other contacts with the member, monitor the services a member receives. This monitoring shall ensure that:

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Service Monitoring Customer gives express consent for Vodafone to monitor Customer’s use of the Service (and disclose and otherwise use the information obtained) only to: (a) the extent allowed by Applicable Law; (b) comply with Applicable Law; (c) protect the Network from misuse; (d) protect the integrity of the public internet and/or Vodafone’s systems and Networks; (e) the extent necessary to determine if Customer has breached any conditions or restrictions on use of the Service; (f) provide the Service; and/or (g) take other actions agreed or requested by Customer.

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

Time is Money Join Law Insider Premium to draft better contracts faster.