RECOVERY PROCEDURES The nature and severity of any disaster will influence the recovery procedures. One crucial factor in determining how BellSouth will proceed with restoration is whether or not BellSouth's equipment is incapacitated. Regardless of who's equipment is out of service, BellSouth will move as quickly as possible to aid with service recovery; however, the approach that will be taken may differ depending upon the location of the problem.
SAFETY PROCEDURES The Contractor shall:
AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.
WARRANTY PROCEDURES You need proof of purchase for warranty service.
Emergency Procedures a) ENP providers shall have a written Emergency/Disaster Plan.
ORDERING PROCEDURES 6.1 If the Authority or any Other Contracting Body decides to source the Services through this Services Framework then each Contracting Body shall be entitled at any time, during the Term to place an order for the Services from the Supplier by serving an Order in accordance with Framework Agreement Schedule 5 (Ordering Procedure).
Induction Procedures a) The parties to this Agreement acknowledge that it is in the interests of the industry that all new employees and employers on a building project understand their obligations to this Agreement and are introduced to their jobs in a manner which will help them work safely and efficiently.
Billing Procedures (a) PROVIDER agrees all claims shall be submitted to OHCA in a format acceptable to OHCA and in accordance with the OHCA Provider Manual.
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.