Security and Redundancy Sample Clauses

Security and Redundancy. (a) Full redundancy shall be provided for the central processing units (CPU) and for the communication links between them and the transducers, instruments, sensors, and other devices which detect measure and transmit the parameters used by the measurement system to apply correction factors to the capacities listed in Schedule 2.
AutoNDA by SimpleDocs
Security and Redundancy. (a) A full list of redundant equipment as advised by NEPCO has been provided by NEPCO for Project Company acceptance prior to signing of this Agreement and consist of the Metering System and the SCADA gateways This redundant capability shall be provided for the central processing units ("CPU") and for the communication links between the CPUs and the transducers, instruments, sensors, and other devices that detect, measure and transmit the parameters used by the measurement system to apply correction factors.

Related to Security and Redundancy

  • Security and Charge 14.1 In consideration of the Contractor agreeing to supply the Materials, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money).

  • Use, Security, and Retention Local Agency shall use, hold and maintain State Confidential Information in compliance with any and all applicable laws and regulations in facilities located within the United States, and shall maintain a secure environment that ensures confidentiality of all State Confidential Information wherever located. Local Agency shall provide the State with access, subject to Local Agency’s reasonable security requirements, for purposes of inspecting and monitoring access and use of State Confidential Information and evaluating security control effectiveness. Upon the expiration or termination of this Agreement, Local Agency shall return State Records provided to Local Agency or destroy such State Records and certify to the State that it has done so, as directed by the State. If Local Agency is prevented by law or regulation from returning or destroying State Confidential Information, Local Agency warrants it will guarantee the confidentiality of, and cease to use, such State Confidential Information.

  • Employment Security and Income Maintenance Plan 21.1 The provisions of the governing Supplemental Agreement shall apply with respect to the Employment Security and Income Maintenance Plan.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Severability and Reformation If any one or more of the terms, provisions, covenants or restrictions of this Agreement shall be determined by a court of competent jurisdiction to be invalid, void or unenforceable, the remainder of the terms, provisions, covenants and restrictions shall remain in full force and effect, and the invalid, void or unenforceable provisions shall be deemed severable. Moreover, if any one or more of the provisions contained in this Agreement shall for any reason be held to be excessively broad as to duration, geographical scope, activity or subject, it shall be reformed by limiting and reducing it to the minimum extent necessary, so as to be enforceable to the extent compatible with the applicable law as it shall then appear.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

Time is Money Join Law Insider Premium to draft better contracts faster.