Automatic voltage control Sample Clauses

Automatic voltage control. Where specified, approved means shall be provided for automatically maintaining, within adjustable limits, a pre-determined voltage at the lower voltage busbars to which the transformer is connected. The tap change shall be of MR Type . Local control shall be so arranged that it is necessary to have the remote selector on a non‑automatic position and the local/remote changeover switch position in the “local” before operation is possible. If the remote selector switch is on any other position, the local/remote switch shall be inoperative. Under these conditions the local switch shall have overriding control. Where specified a voltage regulating relay of an approved type designed to operate from a nominal energizing pressure of 110 V shall be provided for each transformer. The non-load voltage level of the relay shall be adjustable between 90 per cent and 110 per cent of the nominal energizing voltage independent of other adjustments. Unless otherwise specified the sensitivity of the relay shall be suitable for pre-determined adjustment at any value between 0.75 times to not less than 1.5 times the transformer tap step percentage. The relay shall be insensitive to frequency variation within 48 - 52 Hz. In the event of the reference supply voltage being outside the specified operating limits, the voltage control relay shall initiate an alarm and any one of the following options: block further operation of the tap changer until voltage is restored cause the tap changer to run to the position giving minimum voltage cause the tap changer to run automatically to a preset tap position Transfer control automatically to an alternative control point. Associated with the voltage regulating relay, a time delay relay shall be provided, the setting of which shall be adjustable between the limits of 10 and 120 seconds in not less than eleven equal steps. Facilities shall be provided to implement either supervisory or manual control of a two-stage voltage reduction. The equipment supplied should permit either a 3 per cent or 6 per cent voltage reduction and be complete with the necessary control relays, selector switch, etc. Supervisory indication shall be provided in the form of contacts to indicate stage 1 or stage 2 voltage reduction is effective. This indication shall be transmitted to the supervisory control centre whether initiation of the voltage reduction was effected by supervisory or local control.
AutoNDA by SimpleDocs

Related to Automatic voltage control

  • Interconnection Customer Compensation for Actions During Emergency Condition The CAISO shall compensate the Interconnection Customer in accordance with the CAISO Tariff for its provision of real and reactive power and other Emergency Condition services that the Interconnection Customer provides to support the CAISO Controlled Grid during an Emergency Condition in accordance with Article 11.6.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Automatic Acceleration Upon the occurrence of an Event of Default described in Section 8.01(n), the Facility shall be automatically terminated and the Loans and all other Obligations shall be immediately due and payable upon the occurrence of such event, without demand or notice of any kind.

  • Automatic Updates If you choose to allow automatic app updates, your device will periodically check with Apple for updates and upgrades to the Apple Software and, if an update or upgrade is available, the update or upgrade will automatically download and install onto your device and, if applicable, your peripheral devices. You can turn off the automatic app updates altogether at any time by changing the automatic app updates settings found within Settings.

  • Tandem Transit Traffic 12.1 As used in this Section, Tandem Transit Traffic is Telephone Exchange Service traffic that originates on CBB's network, and is transported through Verizon’s Tandem to the subtending End Office or its equivalent of another carrier (CLEC, ILEC other than Verizon, Commercial Mobile Radio Service (CMRS) carrier, or other LEC (“Other Carrier”). Neither the originating nor terminating customer is a Customer of Verizon. Subtending End Offices shall be determined in accordance with and as identified in the Local Exchange Routing Guide (LERG). Switched Exchange Access Service traffic is not Tandem Transit Traffic.

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.2.1 Local circuit switching capability is defined as: (A) line-side facilities, which include, but are not limited to, the connection between a loop termination at a main distribution frame and a switch line card; (B) trunk-side facilities, which include, but are not limited to, the connection between trunk termination at a trunk-side cross-connect panel and a switch trunk card; (C) switching provided by remote switching modules; and (D) all features, functions, and capabilities of the switch, which include, but are not limited to: (1) the basic switching function of connecting lines to lines, line to trunks, trunks to lines, and trunks to trunks, as well as the same basic capabilities made available to BellSouth’s customers, such as a telephone number, white page listings, and dial tone; and (2) all other features that the switch is capable of providing, including but not limited to customer calling, customer local area signaling service features, and Centrex, as well as any technically feasible customized routing functions provided by the switch. Any features that are not currently available but are technically feasible through the switch can be requested through the BFR/NBR process.

  • Drawings Submitted During the Contract Term Where required to develop maintain and deliver diagrams or other technical schematics regarding the scope of work, Contractor shall do so on an ongoing basis at no additional charge, and must, as a condition of payment, update drawings and plans during the Contract term to reflect additions, alterations, and deletions. Such drawings and diagrams shall be delivered to the Authorized User’s representative.

Time is Money Join Law Insider Premium to draft better contracts faster.