Busy Line Verification (BLV) means a service whereby an End User requests an operator to confirm the busy status of a line.
STATUS VERIFICATION SYSTEM This “Status Verification System” requirement, also referred to as “E-Verify”, only applies to contracts issued through a Request for Proposal process and to sole sources that are included within a Request for Proposal.
Verification system means the system maintained by the department under section 19-24.1-31 for verification of registry identification cards.
Verification means the process of comparing sets of data to establish the validity of a claimed identity (one-to-one check);
Verification Report As defined in Section 4.19.
Busy Line Verification (BLV means a service whereby an End User requests an operator to confirm the busy status of a line.
Log means the up-to-date log that is used to track all Modifications to the Facility since the date of this Certificate as required by the Documentation Requirements conditions of this Certificate.
Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.
Independent Verification means that an evaluation is undertaken and reported by an individual or body whose organisation, systems and procedures conform to ISO Guide 65:1996 (EN 45011:1998) General requirements for bodies operating product certification systems (as amended form time to time) or equivalent, and who is accredited to audit against forest management standards by a body whose organisation, systems and procedures conform to ISO 17011: 2004 General Requirements for Providing Assessment and Accreditation of Conformity Assessment Bodies (as amended from time to time) or equivalent.
Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;
E-Verify system means an Internet-based system operated by the United States Department of Homeland Security that allows participating employers to electronically verify the employment eligibility of newly hired employees; and
Security System means the building access control system developed by Alya and known as the O.P.E.N.centrix-Open Platform for Essential Network, which includes, without limitation, the Application Software, the firmware containing the Application Software, the O.P.E.N.cortex platform software and all hardware related thereto; and
CEC Certification and Verification means that the CEC has certified (or, with respect to periods before the Project has commenced commercial operation (as such term is defined by and according to the CEC), that the CEC has pre-certified) that the Project is an ERR for purposes of the California Renewables Portfolio Standard and that all Energy produced by the Project qualifies as generation from an ERR for purposes of the Project.
Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.
Home inspection report means a written report that is
NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).
District and high school graduation report means a report of the number of pupils, excluding adult education participants, in the district for the immediately preceding school year, adjusted for those pupils who have transferred into or out of the district or high school, who leave high school with a diploma or other credential of equal status.
Contractor System means the information and communications technology system used by the Contractor in performing the Services including the Software, the Contractor Equipment and related cabling (but excluding the Authority System).
Central Repository means the repository responsible for the receipt, consolidation, and retention of all information reported to the CAT pursuant to SEC Rule 613 and the CAT NMS Plan.
Social Engineering Security Procedures means security procedures intended to prevent Social Engineering Fraud as set forth in the Application and/or as otherwise provided in writing to the Underwriter.
Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.
air traffic control service means a service provided for the purpose of:
Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.
Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).
Safety Management System has the meaning given to it in the ISM Code.
Freight forwarding services means the activity consisting of organising and monitoring shipment operations on behalf of shippers, through the acquisition of transport and related services, preparation of documentation and provision of business information.