Smoke Detectors and Duct Detectors Sample Clauses

Smoke Detectors and Duct Detectors. (1) Visually inspect for damage (2) Clean to remove any dirt, dust and/or deposits (1) Replace with a backup detector, which has previously been cleaned (2) Test for proper operation by injecting smoke into the detection chamber. (3 to 5 second response) (3) Test for trouble reporting by removing detector from circuit (4) Check operation of any indicator lamps or auxiliary relays (5) Test for proper operation in trouble condition
AutoNDA by SimpleDocs

Related to Smoke Detectors and Duct Detectors

  • Smoke Detectors At Owner's expense, smoke detectors will be installed on the Property in working condition in accordance with the law prior to the tenant's occupancy. During the occupancy, it shall be the tenant's responsibility to maintain all smoke detectors. Owner will replace smoke detector equipment as needed.

  • Weapons We have a zero tolerance of the possession of weapons (sword, knives etc) or firearms (guns etc) in the Room, Building or Common Property. If You are found in possession of weapons, firearms or implements associated with their use in the Room, Building or Common Property We will immediately terminate this agreement and inform the relevant UNSW and legal authorities.

  • Optional Mediation The Parties may mutually agree to non-binding mediation: (a) If the grievance is not resolved at Step 3, either Party may request that a Mediator be appointed to meet with the Parties, investigate and define the issues in dispute and facilitate a resolution. (b) The Mediator shall be appointed by mutual agreement between the Parties. (c) The purpose of the Mediator's involvement in the grievance process is to assist the Parties in reaching a resolution of the dispute, and anything said, proposed, generated or prepared for the purpose of trying to achieve a settlement is to be considered privileged and will not be used for any other purpose. (d) The expenses of the Mediator shall be equally borne by both Parties. (e) The grievance may be resolved by mutual agreement between the Parties.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Metering The Interconnection Customer shall be responsible for the Connecting Transmission Owner’s reasonable and necessary cost for the purchase, installation, operation, maintenance, testing, repair, and replacement of metering and data acquisition equipment specified in Attachments 2 and 3 of this Agreement. The Interconnection Customer’s metering (and data acquisition, as required) equipment shall conform to applicable industry rules and Operating Requirements.

  • Calibration The comparison of a measurement system or device of unverified accuracy with a measurement system of known and greater accuracy to detect deviation of the unverified measurement system from required performance specifications (of the unverified measurement system or device) and to quantify all measured values to applicable units of the international system of units.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Voltage Regulators Whenever the Large Generating Facility is operated in parallel with the New York State Transmission System, the automatic voltage regulators shall be in automatic operation at all times. If the Large Generating Facility’s automatic voltage regulators are not capable of such automatic operation, the Developer shall immediately notify NYISO, or its designated representative, and ensure that such Large Generating Facility’s real and reactive power are within the design capability of the Large Generating Facility’s generating unit(s) and steady state stability limits and NYISO system operating (thermal, voltage and transient stability) limits. Developer shall not cause its Large Generating Facility to disconnect automatically or instantaneously from the New York State Transmission System or trip any generating unit comprising the Large Generating Facility for an under or over frequency condition unless the abnormal frequency condition persists for a time period beyond the limits set forth in ANSI/IEEE Standard C37.106, or such other standard as applied to other generators in the New York Control Area on a comparable basis.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!