Cameras j) Portable music player, headphones.
Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:
Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.
Reverse ADSL Loops If a CLEC’s ADSL Transmission Unit (including those integrated into DSLAMs) is attached to Sprint’s Network and if an ADSL Copper Loop should start at an outside location, and is looped through a host or remote, and then to the subscriber, the copper plant from the outside location to the Sprint host or remote central office must be a facility dedicated to ADSL transmission only and not part of Sprint’s regular feeder or distribution plant.
Unbundled Digital Loops 2.3.1 BellSouth will offer Unbundled Digital Loops (UDL). UDLs are service specific, will be designed, will be provisioned with test points (where appropriate), and will come standard with OC and a DLR. The various UDLs are intended to support a specific digital transmission scheme or service.
Mowing Mowing, edging (of sidewalks, paved approaches and curbs), litter removal, herbicide treatment, grass clipping removal, and brush control are included under one bid item. Regular mowing under this contract is generally limited to mowing areas of shoulders, front and back slopes of ditches less than or equal to three-to-one (3:1) slope, roadside retention areas, dry roadside ditch bottoms, median islands and various width utility strips and similar areas. Slope mowing, which is also a contract requirement, is generally limited to slopes greater or steeper than three-to-one (3:1) and are relatively inaccessible to the use of conventional mowing equipment (e.g., steep slopes, retention area banks and shores, bridge/overpass banks, canal banks, wet roadside ditches, etc). These types of areas will normally require equipment specifically designed for this type of work. When slope mowing is performed, it will incorporate the use of string trimmers to protect the integrity of the slope and prevent damage to the turf. Sign posts, mailboxes, guardrails, trees, roadside outfall structures, fences, divider walls, shrubs, plants, light poles, utility flags or other such obstacles to mowing will be hand mowed or trimmed around as necessary to present a groomed appearance. Top of vegetation on wet bottom ditches areas must be cut-off to the water’s level. Particular attention will be paid to planted areas. Any damage that occurs to plants, trees, shrubs, mulched beds, tree rings, sprinkler heads, etc., will be repaired or restored, at the Contractor’s expense, before the cycle is completed. Mowing will also include grass clipping removal and litter removal, edging, and herbicide treatment. These costs will be included in the unit price bid for right-of-way mowing.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.