Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.
Logistics The Client shall arrange their own transportation and accommodation, unless Client and Performer agree otherwise. If requested, the Performer shall arrange transport within Ostrava, and provide accommodation in a hotel.
Information Systems The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.
Electric Storage Resources Developer interconnecting an electric storage resource shall establish an operating range in Appendix C of its LGIA that specifies a minimum state of charge and a maximum state of charge between which the electric storage resource will be required to provide primary frequency response consistent with the conditions set forth in Articles 9.5.5, 9.5.5.1, 9.5.5.2, and 9.5.5.3 of this Agreement. Appendix C shall specify whether the operating range is static or dynamic, and shall consider (1) the expected magnitude of frequency deviations in the interconnection; (2) the expected duration that system frequency will remain outside of the deadband parameter in the interconnection; (3) the expected incidence of frequency deviations outside of the deadband parameter in the interconnection; (4) the physical capabilities of the electric storage resource; (5) operational limitations of the electric storage resources due to manufacturer specification; and (6) any other relevant factors agreed to by the NYISO, Connecting Transmission Owner, and Developer. If the operating range is dynamic, then Appendix C must establish how frequently the operating range will be reevaluated and the factors that may be considered during its reevaluation. Developer’s electric storage resource is required to provide timely and sustained primary frequency response consistent with Article 9.5.5.2 of this Agreement when it is online and dispatched to inject electricity to the New York State Transmission System and/or receive electricity from the New York State Transmission System. This excludes circumstances when the electric storage resource is not dispatched to inject electricity to the New York State Transmission System and/or dispatched to receive electricity from the New York State Transmission System. If Developer’s electric storage resource is charging at the time of a frequency deviation outside of its deadband parameter, it is to increase (for over-frequency deviations) or decrease (for under-frequency deviations) the rate at which it is charging in accordance with its droop parameter. Developer’s electric storage resource is not required to change from charging to discharging, or vice versa, unless the response necessitated by the droop and deadband settings requires it to do so and it is technically capable of making such a transition.
Cultural Resources If a cultural resource is discovered, the Purchaser shall immediately suspend all operations in the vicinity of the cultural resource and notify the Forest Officer. Operations may only resume if authorized by the Forest Officer. Cultural resources identified and protected elsewhere in this contract are exempted from this clause. Cultural resources, once discovered or identified, are not to be disturbed by the Purchaser, or his, her or its employees and/or sub- contractors.
Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.
Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:
Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.
Energy Cooperation shall focus on: (a) renewable energy; (b) promoting the saving of energy; (c) applied research relating to networks of databases linking the two Parties' economic and social operators; (d) backing efforts to modernise and develop energy networks and the interconnection of such networks with Community networks.
Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement. 60.2 The Parties will employ characteristics and methods of operation that will not interfere with or impair the Parties’ networks, or the network of any third parties or Affiliated companies, connected with or involved directly in the network or facilities of CenturyLink. 60.3 CLEC shall not interfere with or impair service over any circuits, facilities or equipment of CenturyLink, its Affiliated companies, or its connecting and concurring carriers. 60.4 If CLEC causes any impairment or interference, CenturyLink shall promptly notify CLEC of the nature and location of the problem and that, unless promptly rectified, a temporary discontinuance of the use of any circuit, facility or equipment may be required. The Parties agree to work together to attempt to promptly resolve the impairment or interference. If CLEC is unable to promptly remedy, then CenturyLink may, at its option, temporarily discontinue the use of the affected circuit, facility or equipment until the impairment is remedied. 60.5 Any violation of Applicable Law or regulation regarding the invasion of privacy of any communications carried over CenturyLink’s facilities, or that creates hazards to the employees of CenturyLink or to the public, is also considered an impairment of service. 60.6 CenturyLink shall give advanced notice to CLEC of all non-scheduled maintenance or other planned network activities to be performed by CenturyLink on any Network Element, including any hardware, equipment, software, or system, providing service functionality of which CLEC has advised CenturyLink may potentially impact CLEC End Users. 60.7 The Parties shall provide notice of network changes and upgrades in accordance with 47 C.F.R. §§51.325 through 51.335. CenturyLink may discontinue any Interconnection arrangement, Telecommunications Service, or Network Element provided or required hereunder due to network changes or upgrades after providing CLEC notice as required by this Section. CenturyLink agrees to cooperate with CLEC and/or the appropriate regulatory body in any transition resulting from such discontinuation of service and to minimize the impact to customers which may result from such discontinuance of service.