ACCESS LADDERS Sample Clauses

ACCESS LADDERS. Any fixed ladder providing access and egress should be inspected as a part of the scaffold by a competent person. Between uses, test for sound construction by: • Taking each end of the ladder in turn and trying to push the ▇▇▇▇▇▇ apart and then together. Movement will indicate insecurely fixed rungs and loose tie rods. • Laying the ladder flat, raising one end and attempting to push one stile while pulling the other. If the ▇▇▇▇▇▇ can be moved relative to each other, the rungs are loose. • Tapping timber rungs with a mallet. A dull sound indicates a defective rung. FIGURE 13.9(A) FAULTS IN TIMBER SCAFFOLD PLANKS COPYRIGHT FIGURE 13.9(B) FAULTS IN METAL SCAFFOLD PLANKS Any ladder that is damaged or unsound should be removed from service, until it has been repaired and has passed re-inspection. Condemn a ladder if any of the following faults exist: • Timber ▇▇▇▇▇▇ are warped, splintered, cracked or bruised. • Metal ▇▇▇▇▇▇ are twisted, bent, kinked, crushed, have cracked welds or have damaged feet. • Rungs, steps, treads or top plates are missing, worn, damaged or loose. • Tie rods are missing, broken or loose. • Ropes, braces or brackets are missing, broken or worn. • Timber members, apart from narrow identification bands, are covered with an opaque paint or any other treatment that could disguise faults in the timber.

Related to ACCESS LADDERS

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.