Bumper Checking System Sample Clauses

Bumper Checking System. 1. Check longitudinal gap (1/8”) and make sure bumper devices are secure.
AutoNDA by SimpleDocs

Related to Bumper Checking System

  • Carrier Lines All Participants acknowledge that the Transaction of Message Content between Participants is to be provided over various facilities and communications lines, and information shall be transmitted over local exchange and Internet backbone carrier lines and through routers, switches, and other devices (collectively, “carrier lines”) owned, maintained, and serviced by third-party carriers, utilities, and Internet service providers, all of which may be beyond the Participants’ control. Provided a Participant uses reasonable security measures, no less stringent than those directives, instructions, and specifications contained in this Agreement, the Performance and Service Specifications, and the Operating Policies and Procedures, the Participants assume no liability for or relating to the integrity, privacy, security, confidentiality, or use of any information while it is transmitted over those carrier lines, which are beyond the Participants’ control, or any delay, failure, interruption, interception, loss, transmission, or corruption of any Message Content or other information attributable to transmission over those carrier lines which are beyond the Participants’ control. Use of the carrier lines is solely at the Participants’ risk and is subject to all Applicable Law.

  • Terminals Hartford Terminal. Hartford Terminal is located at or near Hartford, Illinois. The facility consists of a two-bay truck rack with 17,000 barrels of active terminaling capacity, 13 above-ground storage tanks with approximately 1.1 million barrels of total storage capacity. The Hartford barge dock consists of a single-berth barge loading facility, approximately 0.8 miles of 8-inch pipeline and approximately 0.8 miles of 14-inch pipeline from the Hartford terminal to the Hartford barge dock for delivery.

  • Interconnection Customer Obligations The Interconnection Customer shall maintain the Large Generating Facility and the Interconnection Customer’s Interconnection Facilities in a safe and reliable manner and in accordance with this LGIA.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Catalog Information about Community Regional Medical Center – Diagnostic Medical Sonography Program (CRMC-DMSP) is published in a school catalog that contains a description of certain policies, procedures, and other information about the school. CRMC-DMSP reserves the right to change any provision of the catalog at any time. Notice of changes will be communicated in a revised catalog, an addendum or supplement to the catalog, or other written format. Students are expected to read and be familiar with the information contained in the school catalog, in any revisions, supplements and addenda to the catalog, and with all school policies. By enrolling in CRMC-DMSP, the Student agrees to abide by the terms stated in the catalog and all school policies.

  • Video Display Terminals ‌ The Employer shall ensure that any new office equipment or facility required for use in conjunction with VDTs shall meet the standards recommended by the Workers' Compensation Board.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • PATROL VIDEO SYSTEMS 2 1. As part of the law enforcement services to be provided to CITY, COUNTY 3 has provided, or will provide, patrol video systems (hereinafter called “PVS”) 4 that are or will be mounted in patrol vehicles designated by COUNTY for 5 use within CITY service area.

Time is Money Join Law Insider Premium to draft better contracts faster.