Security of supply and energy security Sample Clauses

Security of supply and energy security.  The calculation of security of supply benefit cannot be considered appropriate as the results are the same in each of the scenarios.  The calculated disruption cost is not appropriate as value of this interruption is based on gas’ share in the energy mix and total GDP in Finland.  The calculation does not take into account not obligated gas supply interruption mitigation means. The fuel switching possibilities are not properly considered.  There has never been gas supply disruption in the range of 14 or 30 days in Finland.  The two LNG terminals currently under construction in Finland are seemingly not taken into consideration.
AutoNDA by SimpleDocs

Related to Security of supply and energy security

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Provision of Interconnection Financial Security The Interconnection Customer is obligated to provide all necessary Interconnection Financial Security required under Section 11 of the GIDAP in a manner acceptable under Section 11 of the GIDAP. Failure by the Interconnection Customer to timely satisfy the GIDAP’s requirements for the provision of Interconnection Financial Security shall be deemed a breach of this Agreement and a condition of Default of this Agreement.

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • ENHANCED AND SUPPLEMENTAL SERVICES BY COUNTY (Continued) 2 ongoing services that SHERIFF otherwise would provide to CITY pursuant to 3 this Agreement. Such supplemental services shall be provided only by 4 regularly appointed full-time peace officers, at rates of pay governed by a 5 Memorandum of Understanding between COUNTY and the bargaining unit 6 representing the peace officers providing the services. Such supplemental 7 services shall include only law enforcement duties and shall not include 8 services authorized to be provided by a private patrol operator, as defined in 9 Section 7582.1 of the Business and Professions Code. Law enforcement 10 support functions, including, but not limited to, clerical functions and forensic 11 science services, may be performed by non-peace officer personnel if the 12 services do not involve patrol or keeping the peace and are incidental to the 13 provision of law enforcement services. CITY shall reimburse COUNTY its 14 full, actual costs of providing such supplemental services at an amount 15 computed by SHERIFF, based on the current year's COUNTY law 16 enforcement cost study. The cost of these supplemental services shall be in 17 addition to the Maximum Obligation of CITY set forth in Subsection G-2 of 18 this Agreement. SHERIFF shall xxxx CITY immediately after each such event.

  • Security of Premises 6A.5 The Customer shall be responsible for maintaining the security of the Premises in accordance with its standard security requirements. The Supplier shall comply with all reasonable security requirements of the Customer while on the Premises and shall ensure that the Supplier’s Staff comply with such requirements.

  • Financing Statement To the extent permitted by applicable law, a carbon, photographic or other reproduction of this Agreement or any financing statement covering the Collateral shall be sufficient as a financing statement.

  • Security of Data a. Each of the parties shall:

  • Supplemental Services For requests for supplemental services relating to eBuyITT Invoice Processing by Service Receiver not mentioned in this Schedule or not included within the costs documented in this agreement, Service Receiver will provide a discreet project request and submit such request to Service Provider using the formalized Change Request attached as Annex A for consideration by Service Provider. Where notice is required a number of business days prior to some required action by Service Provider, notice must be received by 12 noon Eastern Time to be counted as received during such business day. Service Provider shall, within a commercially reasonable period, provide a price quote to be commercially reasonable based on the current cost of the Services to Service Receiver taking into account, such items as the specific time the request was made, service delivery volumes, exit planning activities, and other activities Service Provider is currently engaged in at the time of the request, but not later than 30 days after the request was made. If Service Provider, in its sole discretion determines (i) such request would increase the ongoing operating costs for Service Provider (as a service recipient) or any other service receiver or (ii) that it is not capable of making such changes with its current staff during the time period requested without interrupting the Services provided to itself or any other service receiver. Service Provider need not provide a price quote or perform the services. Where a price quote is provided, Service Provider shall provide the service requested upon acceptance of the price.

  • Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

Time is Money Join Law Insider Premium to draft better contracts faster.