Security Fencing and Gates Sample Clauses

Security Fencing and Gates. The information on this drawing shall be depicted at a scale consistent with FAA SOP 2.0. Product: Individual Area Plans projecting development consistent with the ALP drawing, but in greater detail. Task 6.3 - Airport Airspace Drawing (FAR Part 77) The FAR Part 77 drawing depicts the plan view of the ultimate FAR Part 77 imaginary surfaces for the airport. The existing and future full-length approach plan and profile views to each runway end. Any obstructions will be listed, the amount of penetration determined (using AGIS data) and their proposed disposition will be identified. Fifty-foot contour intervals will be shown for all FAR Part 77 imaginary surfaces for full length of all approach surfaces. NOS Obstruction Chart and AGIS obstruction data will be incorporated into the drawing, as appropriate. USGS quadrangle maps or AGIS data will be utilized for the base layer on the Part 77 plan view. Product: A FAR Part 77 airspace plan drawing for the airport Task 6.4 - Runway Protection Zone (RPZ)/Inner Approach Plan and Profile Drawings Drawings will be prepared that show the plan view of the Runway Protection Zones (RPZ) and plan and profile views of the inner portion of the runway approach surface for each runway end. In addition, obstacle clearance surfaces (OCS) or TERPS instrument runway departure surfaces will be depicted, as applicable. Any obstructions within the RPZ or the other noted surfaces will be identified and a recommended disposition will be provided. Aerial photography and AGIS data may be used to develop these drawings. This drawing may be combined with other drawings. Product: A Runway Protection Zone/Approach Plan and Profile drawing that shows the RPZs for each runway end at the airport.
AutoNDA by SimpleDocs

Related to Security Fencing and Gates

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Monitoring and Recording COMMUNICATIONS - We may monitor and record communications between you and us, including telephone conversations, electronic messages, electronic records, or other data transmissions that affect your accounts or other products and services. Except as otherwise prohibited by applicable law, you agree we may monitor and record such communications without your approval or further notice to you.

  • NMHS Governance, Safety and Quality Requirements 3.1 Participates in the maintenance of a safe work environment.

  • SMHS Governance, Safety and Quality Requirements 4.1 Participates in the maintenance of a safe work environment.

  • EMHS Governance, Safety and Quality Requirements 4.1 Participates in the maintenance of a safe work environment.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • PERFORMANCE MONITORING AND REPORTING Performance indicators

Time is Money Join Law Insider Premium to draft better contracts faster.