Vault Puller Sample Clauses

Vault Puller generally defined as an employee whose duties are as follows: • When a bus enters the vault station, the Vault Puller will record the vehicle mileage, probe the fare box, remove the cash box, and empty the cash box into the secured vault. • Additional duties include, but are not limited to, cleaning the inside and outside of the fare box when needed and making notes of defects inside and outside the bus that need repairing. • The Vault Puller may also be required to detail the inside of the bus. The Vault Puller must be capable of performing these duties in a timely manner. No CDL is required for this position as Vault Pullers are not allowed to operate a bus on or off the Agency’s property.
AutoNDA by SimpleDocs

Related to Vault Puller

  • Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Bandwidth the amount of data (quantified as “Mbps” or “Gbps”) made available to Customer as specified in a Service Order.

  • Dark Fiber 8.1 Access to unbundled Dark Fiber will be provided by Verizon, where existing facilities are available at the requested availability date, in the loop, subloop and interoffice facilities (IOF) portions of the Company's network. Access to Dark Fiber will be provided in accordance with, but only to the extent required by, Applicable Law. Except as otherwise required by Applicable Law, the following terms and conditions apply to Verizon's Dark Fiber offering. 8.2 A “Dark Fiber Loop” consists of continuous fiber optic strand(s) in a Verizon fiber optic cable between the fiber distribution frame, or its functional equivalent, located within a Verizon Wire Center, and Verizon’s main termination point, such as the fiber patch panel located within a Customer premise, and that has not been activated through connection to the electronics that “light” it, and thereby render it capable of carrying Telecommunications Services. In addition to the other terms and conditions of this Agreement, the following terms and conditions also shall apply to Dark Fiber Loops: 8.2.1 Verizon shall be required to provide a Dark Fiber Loop only where (1) one end of the Dark Fiber Loop terminates at Z-Tel's collocation arrangement and (2) the other end terminates at the Customer premise. A CLEC demarcation point shall be established either in the main telco room of a building where a Customer is located or, if the building does not have a main telco room, then at a location to be determined by Verizon. Verizon shall connect a Dark Fiber Loop to the demarcation point by installing a fiber jumper. 8.2.2 Z-Tel may access a Dark Fiber Loop only at a pre-existing hard termination point of such Dark Fiber Loop, and Z-Tel may not access a Dark Fiber Loop at any other point, including, but not limited to, a splice point. Verizon will not introduce additional splice points or open existing splice points to accommodate a CLEC’s request. Unused fibers located in a cable vault or a controlled environment vault, manhole or other location outside the Verizon Wire Center, and not terminated to a fiber patch, are not available to Z-Tel. 8.2.3 A strand shall not be deemed to be continuous if splicing is required to provide fiber continuity between two locations. Dark Fiber will only be offered on a route-direct basis where facilities exist (i.e., no intermediate offices). 8.2.4 Verizon shall perform all work necessary to install a cross connection or a fiber jumper, including, but not limited to, the work necessary to connect a dark fiber to a demarcation point, a fiber distribution frame or a POT bay. 8.2.5 At the Customer premise, unused fibers are not available to Z-Tel pursuant to this Attachment unless such fibers terminate on a fiber patch panel. Unused fibers in a fiber splice point located outside the Customer premise are not available to Z-Tel. 8.2.6 Dark Fiber will be offered to Z-Tel in the condition that it is available in Verizon's network at the time that Z-Tel submits its request (i.e., "as is"). In addition, Verizon shall not be required to convert lit fiber to Dark Fiber for Z-Tel's use. 8.2.7 Spare wavelengths on fiber strands, where Wave Division Multiplexing (WDM) or Dense Wave Division Multiplexing (DWDM) equipment is deployed, are not considered to be spare Dark Fiber Loops and, therefore, will not be offered to Z-Tel as Dark Fiber. 8.2.8 Z-Tel shall be responsible for providing all transmission, terminating and regeneration equipment necessary to light and use Dark Fiber. 8.2.9 Z-Tel may not resell Dark Fiber purchased pursuant to this Attachment to third parties. 8.2.10 In order for Verizon to continue to satisfy its carrier of last resort (COLR) obligations under Applicable Law and/or to preserve the efficiency of its network, Verizon will limit Z-Tel to leasing a maximum of twenty-five percent (25%) of the Dark Fiber in any given segment of Verizon's network during any two-year period. In addition, except as otherwise required by Applicable Law, Verizon may take any of the following actions, notwithstanding anything to the contrary in this Agreement: 8.2.10.1 Revoke Dark Fiber leased to Z-Tel upon a showing of need to the Commission and twelve (12) months' advance written notice to Z-Tel; and 8.2.10.2 Revoke Dark Fiber leased to Z-Tel upon a showing to the Commission that Z-Tel underutilized fiber (less than OC-12) within any twelve (12) month period. 8.2.10.3 Verizon may reserve Dark Fiber for maintenance purposes, or to satisfy Customer orders for fiber related services or for future growth. Verizon reserves and shall not waive, Verizon’s right to claim before the Commission that Verizon should not have to fulfill a Z-Tel order for Dark Fiber because that request would strand an unreasonable amount of fiber capacity, disrupt or degrade service to Customers or carriers other than Z-Tel, or impair a Verizon obligation to serve as a carrier of last resort. 8.2.11 Z-Tel may not reserve Dark Fiber.

  • Dark Fiber Loop 2.8.4.1 Dark Fiber Loop is an unused optical transmission facility, without attached signal regeneration, multiplexing, aggregation or other electronics, from the demarcation point at an End User’s premises to the End User’s serving wire center. Dark Fiber Loops may be strands of optical fiber existing in aerial or underground structure. BellSouth will not provide line terminating elements, regeneration or other electronics necessary for AFN to utilize Dark Fiber Loops.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • INTERIM MAINTENANCE PERIOD During the interim maintenance period between obtaining of the completion certificate of such Project and formation and operationalization of the Association the Promoter shall through itself or through a facility management company to run, operate, manage and maintain the Common Areas. The Promoter shall endeavour that the committee responsible for the maintenance and operation of the Common Areas will be required to provide manpower for maintaining the Common Areas, wherever required, and to collect maintenance charges and also guest charges and the user charges for the utilities being provided on “pay by use” basis, if any. The maintenance and management of Common Areas by the committee will primarily include but not limited to maintenance of water works, common electrical installations, DG Sets, landscaping, driveways, parking areas, lobbies, lifts and staircases, AMC’s etc. It will also include safety and security of the Project such as fire detection and protection and management of general security control of the Project. The Rules/ Bye Laws to regulate the use and maintenance of the Common Areas shall during the interim maintenance period shall be framed by the Promoter with such restrictions as may be necessary for proper maintenance and all the Allottees are bound to follow the same. After the Common Areas of the Project are handed over to the Association, the Association may adopt the Rules and the Bye laws framed by the Promoter, with or without amendments, as may be deemed necessary by the Association.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • SBC-12STATE 47.1.1 The terms contained in this Agreement and any Appendices, Attachments, Exhibits, Schedules, and Addenda constitute the entire agreement between the Parties with respect to the subject matter hereof, superseding all prior understandings, proposals and other communications, oral or written between the Parties during the negotiations of this Agreement and through the execution and/or Effective Date of this Agreement. This Agreement shall not operate as or constitute a novation of any agreement or contract between the Parties that predates the execution and/or Effective Date of this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!