Security and Redundancy Sample Clauses

POPULAR SAMPLE Copied 1 times
Security and Redundancy. (a) A full list of redundant equipment as advised by NEPCO has been provided by NEPCO for Project Company acceptance prior to signing of this Agreement and consist of the Metering System and the SCADA gateways This redundant capability shall be provided for the central processing units ("CPU") and for the communication links between the CPUs and the transducers, instruments, sensors, and other devices that detect, measure and transmit the parameters used by the measurement system to apply correction factors. (b) The Project Company shall be entitled to gain access to any software application or programs that may be used to operate or calibrate the CPUs and the transducers, instruments, sensors, and other devices which detect, measure and transmit the parameters used by the measurement system provided that NEPCO's personnel shall be entitled to enter a restricted security code every time that such access is required.
Security and Redundancy. (a) Full redundancy shall be provided for the central processing units (CPU) and for the communication links between them and the transducers, instruments, sensors, and other devices which detect measure and transmit the parameters used by the measurement system to apply correction factors to the capacities listed in Schedule 2. (b) The Company shall not be able to gain access to any software application or programs that may be used to operate or calibrate the CPUs and the transducers, instruments, sensors, and other devices which detect, measure and transmit the parameters used by the measurement system unless BPDB’s personnel input a restricted security code every time that this access is required.
Security and Redundancy. (a) Full redundancy shall be provided for the central processing units (CPU) and for the communication links between them and the transducers, instruments, sensors, and other devices which detect measure and transmit the parameters used by the measurement system to apply correction factors to the capacities listed in Schedule 2. (b) Rental Power Company shall not be able to gain access to any software application or programs that may be used to operate or calibrate the CPUs and the transducers, instruments, sensors, and other devices which detect, measure and transmit the parameters used by the measurement system unless the Off-Taker’s personnel input a restricted security code every time that this access is required.

Related to Security and Redundancy

  • Security and Charge 11.1 In consideration of the Seller agreeing to supply the Goods, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money). 11.2 The Client indemnifies the Seller from and against all the Seller’s costs and disbursements including legal costs on a solicitor and own client basis incurred in exercising the Seller’s rights under this clause. 11.3 The Client irrevocably appoints the Seller and each director of the Seller as the Client’s true and lawful attorney/s to perform all necessary acts to give effect to the provisions of this clause 11 including, but not limited to, signing any document on the Client’s behalf.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at ▇▇▇▇▇://▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/articles/purecloud-security-compliance/.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.

  • Security and Offset Issuer hereby grants to NCPS and the Indemnified Parties a security interest in and lien upon the Escrow Funds (to the extent of Issuer’s rights thereto) to secure all obligations hereunder, and NCPS and the Indemnified Parties shall have the right to offset the amount of any compensation or reimbursement due any of them hereunder (including any claim for indemnification pursuant to Section 9 hereof) against the Escrow Funds (to the extent of Issuer’s rights thereto.) If for any reason the Escrow Funds available to NCPS and the Indemnified Parties pursuant to such security interest or right of offset are insufficient to cover such compensation and reimbursement, Issuer shall promptly pay such amounts to NCPS and the Indemnified Parties upon receipt of an itemized invoice.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.