Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.
Mileage Measurement Where required, the mileage measurement for LIS rate elements is determined in the same manner as the mileage measurement for V&H methodology as outlined in NECA Tariff No. 4.
Interim Measures 6.1 The Parties acknowledge that the British Columbia Claims Task Force made the following recommendation concerning Interim Measures:
Scaling “Scaling,” as used herein, involves:
Provisioning Line Splitting and Splitter Space 3.8.1 The Data LEC, Voice CLEC or BellSouth may provide the splitter. When CCI or its authorized agent owns the splitter, Line Splitting requires the following: a non- designed analog loop from the serving wire center to the network interface device (NID) at the end user’s location; a collocation cross connection connecting the loop to the collocation space; a second collocation cross connection from the collocation space connected to a voice port; the high frequency spectrum line activation, and a splitter. The loop and port cannot be a loop and port combination (i.e. UNE-P), but must be individual stand-alone network elements. When BellSouth owns the splitter, Line Splitting requires the following: a non designed analog loop from the serving wire center to the network interface device (NID) at the end user’s location with CFA and splitter port assignments, and a collocation cross connection from the collocation space connected to a voice port. 3.8.2 An unloaded 2-wire copper loop must serve the end user. The meet point for the Voice CLEC and the Data LEC is the point of termination on the MDF for the Data LEC's cable and pairs. 3.8.3 The foregoing procedures are applicable to migration to Line Splitting Service from a UNE-P arrangement, BellSouth Retail Voice Service, BellSouth High Frequency Spectrum (CO Based) Line Sharing. 3.8.4 For other migration scenarios to line splitting, BellSouth will work cooperatively with CLECs to develop methods and procedures to develop a process whereby a Voice CLEC and a Data LEC may provide services over the same loop.
Staffing Plan The Board and the Association agree that optimum class size is an important aspect of the effective educational program. The Polk County School Staffing Plan shall be constructed each year according to the procedures set forth in Board Policy and, upon adoption, shall become Board Policy.
Baseline For purposes of measuring a reduction in net tax revenue, the interim final rule measures actual changes in tax revenue relative to a revenue baseline (baseline). The baseline will be calculated as fiscal year 2019 (FY 2019) tax revenue indexed for inflation in each year of the covered period, with inflation calculated using the Bureau of Economic Analysis’s Implicit Price Deflator.163 FY 2019 was chosen as the starting year for the baseline because it is the last full fiscal year prior to the COVID– 162 See, e.g., Tax Policy Center, How do state earned income tax credits work?, https:// xxx.xxxxxxxxxxxxxxx.xxx/xxxxxxxx-xxxx/xxx-xx- state-earned-income-tax-credits-work/ (last visited May 9, 2021).
Protective Measures We have implemented and will maintain appropriate technical and organisational measures in relation to the Services taking into account the state of the art, the costs of implementation, and the nature, scope, context and purposes of Processing, as well as the likelihood and severity of risk to the rights and freedoms of data subjects. This includes measures relating to the physical security of Our facilities used to deliver them, measures to control access rights to Our assets and relevant networks, and processes for testing these measures. In accordance with Our obligations under applicable law, We may undertake digital forensic investigations in relation to the use of the Services and Subscriptions. You are responsible for using, and ensuring that your Users use, the controls and advice provided by the Services correctly and consistently.