Problem Log definition

Problem Log. GRANTEE shall establish a “Problem Log” that records all problems noted with the SAVNS system, including, but not limited to, system down time, system outages, and equipment failure. The Problem Log will provide when the problem was identified, to whom the problem was referred, steps taken to resolve the problem, and when the problem was resolved. GRANTEE shall provide OAG with any and all Problem Logs at OAG’s request.
Problem Log means a brief description of a Defect in a chronological record.

Examples of Problem Log in a sentence

  • For each identified violation, a Security Problem Log ticket is issued, which the administrator must address.

  • All instructors of the Medical Assisting designated courses (MED*) will be hired with a preference for Certified Medical Assistants.

  • After the entry into force of the contract, the Contractor will create a Problem Log.Whenever a new problem is observed (that may affect the devices, the solutions or services delivered to the IO), the Contractor will open a new record in the Problem Log and will assign it a unique ID.

  • Weiser, Deputy Director, Democracy Program, Brennan Center for Justice at NYU School of Law before the Subcommittee on Financial Services and General Government of the House Appropriations Committee.U.S. House of Representatives, February 2008 ⟨URL: http://www.brennancenter.org/content/resource/testimony_ before_congress_regarding_the_eac/⟩.53John Gideon and Ellen Theisen, Election Problem Log: 2004 to Date.

  • The reporting, investigation and outcome of this procedure will be recorded on a Tutor Report form, Governance Group minutes, and the appropriate Problem Log for the training year.

  • Problem records in the Problem Log will be marked "FINISHED" by the Contractor when appropriate.

  • Appendix 1: Players' Action Log Name Position Agency Page of Time/DateAppendix 2: Problem Log Exercise assignment: Player, Controller, Simulator, Evaluator, Director, Observer (circle one)TimeMessage No. (if known)ProblemAnalysis Note: Log should be sent to panstopcontrol@wpro.who.int at the end of the exercise.Appendix 3: Participants' exercise evaluation form 1.

  • The VPN permits designated CTS who are currently away from WMATA’s network to access the WMATA WAN and the current management ticketing system Problem Log.

  • Problem records in the Problem Log will be marked "CLOSED" by the appropriate member of the WMATA staff.

  • All participants should use the Problem Log (Appendix 2) to record problems encountered during the exercise, particularly those that reveal potential weaknesses in the response to a pandemic threat.All participants are requested to attend the after-action debriefing session at the close of exercise play and complete an exercise evaluation form (Appendix 3).

Related to Problem Log

  • Problem means an unknown underlying cause of one or more Incidents. It becomes a Known Error when the root cause is known and a temporary workaround or permanent alternative has been identified.

  • Interoperability means the ability of a CenturyLink OSS Function to process seamlessly (i.e., without any manual intervention) business transactions with CLEC's OSS application, and vice versa, by means of secure exchange of transaction data models that use data fields and usage rules that can be received and processed by the other Party to achieve the intended OSS Function and related response. (See also Electronic Bonding.)

  • Coordinated licensure information system means an integrated process for collecting, storing, and sharing information on nurse licensure and enforcement activities related to nurse licensure laws that is administered by a nonprofit organization composed of and controlled by licensing boards.

  • Operational Acceptance Tests means the tests specified in the Technical Requirements and Agreed Project Plan to be carried out to ascertain whether the System, or a specified Sub system, is able to attain the functional and performance requirements specified in the Technical Requirements and Agreed Project Plan, in accordance with the provisions of GCC Clause 27.2 (Operational Acceptance Test).

  • Project Management Report means each report prepared in accordance with Section 4.02 of this Agreement;

  • Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.

  • Toll Billing Exception Service (TBE means a service that allows End Users to restrict third number billing or collect calls to their lines.

  • Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Electronic Subcontracting Reporting System (eSRS) means the Governmentwide, electronic, web-based system for small business subcontracting program reporting. The eSRS is located at http://www.esrs.gov.

  • Software Error means a reproducible defect or combination thereof in the Software that results in a failure of the Software when used in accordance with the Documentation. Software Errors do not include those errors caused by (a) Licensee’s negligence, (b) any unauthorized modification or alteration Licensee makes to the Software, (c) data that does not conform to Licensor’s specified data format, (d) operator error, or (e) use not conforming to the Licensor’s supported technical environment specified in the Documentation.

  • Conditional Access System means any technical measure and/or arrangement whereby access to a protected radio or television broadcasting service in intelligible form is made conditional upon subscription or other form of prior individual authorisation;

  • Root Cause Analysis Report means a report addressing a problem or non-conformance, in order to get to the ‘root cause’ of the problem, which thereby assists in correcting or eliminating the cause, and prevent the problem from recurring.

  • Critical Path means those Trade Contractor Work activities identified on the Construction Schedule which, if delayed, will cause a corresponding Delay in the Substantial Completion Date.

  • SRS means the scheme referred to by the Ministry of Finance as the Supplementary Retirement Scheme or such other scheme as shall replace or supersede the Supplementary Retirement Scheme from time to time.

  • Downtime means the Total Minutes in the Month during which the Cloud Service (or Servers for Server Provisioning) does not respond to a request from SAP’s Point of Demarcation for the data center providing the Cloud Service (or Server for Server Provisioning), excluding Excluded Downtime.

  • Connectivity means the provision of a Permanent Separated Bicycle Lane system that reflects desired routes between all major origins and destinations in the city.

  • S&P CDO Monitor Test A test that will be satisfied on any date of determination (following receipt, at any time on or after the S&P CDO Monitor Election Date, by the Issuer and the Collateral Administrator of the Class Break-even Default Rates for each S&P CDO Monitor input file (in accordance with the definition of “Class Break-even Default Rate”)) if, after giving effect to a proposed sale or purchase of an additional Collateral Obligation, the Class Default Differential of the Highest Ranking Class of the Proposed Portfolio is positive. The S&P CDO Monitor Test will be considered to be improved if the Class Default Differential of the Proposed Portfolio that is not positive is greater than the corresponding Class Default Differential of the Current Portfolio.

  • UNICEF Supply Website means UNICEF's public access webpage available at http://www.unicef.org/supply/index_procurement_policies.html, as may be updated from time to time.

  • Software Update means a release of Software, in object code form, or firmware, which provides minor fixes, improvements and modifications to the Software or Equipment. Kodak software releases that are designated as updates will be identified A.B.x where the x designates the release as a Software Update.

  • Interface means the mixture occurring in pipeline operations between adjoining batches having similar or dissimilar physical characteristics.

  • Adverse System Impact means a negative effect that compromises the safety or reliability of the electric distribution system or materially affects the quality of electric service provided by the electric distribution company (EDC) to other customers.

  • Web Site Accessibility Standards/Specifications means standards contained in Title 1 Texas Administrative Code Chapter 206.

  • Technical violation means a noncriminal violation of the conditions of parole. This rule is intended to implement Iowa Code section 905.7.

  • Supplier Materials has the meaning given in clause 8.1(h).

  • Hacking means unauthorised access to any computer or other equipment or component or system or item which processes, stores, transmits or retrieves data.