Smart control and BEMS Sample Clauses

Smart control and BEMS. 5.2.1 Status of the intervention Actions 6 and 7 will be implemented through a tendering process. The tender process cover design, procurement, management of permit processes, installation, testing and commissioning of several systems including Smart Controls, monitoring and sensor. All documentation including the specifications has been finalized and the tender process is expected to start by December 2020. The construction is expected to start by Q1 of 2021 and commissioning by April 2021.
AutoNDA by SimpleDocs

Related to Smart control and BEMS

  • Control and Monitoring Each Party shall provide or arrange for 24-hour control and monitoring of their portion of the Interconnection Facilities.

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer. Measures: • SAP uses controls and processes to monitor compliance with contracts between SAP and its customers, subprocessors or other service providers. • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • All SAP employees and contractual subprocessors or other service providers are contractually bound to respect the confidentiality of all sensitive information including trade secrets of SAP customers and partners.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Budget Control Records of expenditures must be maintained for each Award by the cost categories of the approved Budget (including indirect costs that are charged to the Award), and actual expenditures are to be compared with Budgeted amounts at least quarterly.

  • Cost Control The budget established by the OWNER for the construction of the Project and CONSULTANT fee shall be considered as absolute. The CONSULTANT shall advise OWNER in writing of the following:

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Openness and Transparency Contractor shall make available to individuals applicable policies, procedures, and technologies that directly affect such individuals and/or their Protected Health Information and Personally Identifiable Information.

  • Real and Reactive Power Control 36 9.6 Outages and Interruptions. 37 9.7 Switching and Tagging Rules. 41 9.8 Use of Attachment Facilities by Third Parties. 41 9.9 Disturbance Analysis Data Exchange. 42 ARTICLE 10. MAINTENANCE 42 10.1 Connecting Transmission Owner Obligations. 42 10.2 Developer Obligations. 42 10.3 Coordination. 42 10.4 Secondary Systems. 42 10.5 Operating and Maintenance Expenses. 43 ARTICLE 11. PERFORMANCE OBLIGATION 43

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

Time is Money Join Law Insider Premium to draft better contracts faster.