CAC Sample Clauses

CAC. The most commonly used unclassified PKI hardware token or smart card is the CAC. On AF installations, the Air Force Military Personnel Flight (MPF) issues the CAC. The CAC is the primary hardware token for identifying individuals for logical access to NIPRNET assets and physical access to DoD facilities according to Directive-Type Memorandum (DTM) 08-003, Next Generation Common Access Card (CAC) Implementation Guidance (to be incorporated into DoD Manual 1000.13-M Volume 1). In accordance with HSPD-12, any new applicant for the Common Access Card (CAC) will require an appropriate background investigation prior to issuance of the CAC. The locally appointed Contractor Verification System (CVS) Trusted Agent (TA) individual (e.g. organizational security manager) verifies contractor access against a valid contract in the CVS before approving the request for a contractor to be issued a Common Access Card (CAC). ID Cards (to include CAC or other issued forms of identification, and/or entry and/or access control tokens, cards, or related items}, are the property of the United States government. and holders are required to safeguard their ID Cards at all times. Contractor/s must report lost or stolen ID Card/s immediately to the government Security Manager. Such ID Cards shall be returned promptly to the government Security Manager upon termination of the contract and/or when a contractor no longer requires the ID Card/s, due to change in employment or any other like condition removinghl e legitimate need to maintain the ID Card/s.
AutoNDA by SimpleDocs
CAC. 19940617, 7 April 1992. Note a` l’attention du premier ministre.
CAC. 19940617, 7 May 1992. Note pour le Pre´sident de la Re´publique.
CAC. Connection Admission Control (CAC) is the component that takes a decision on whether to accept or reject a request for service based on resource availability. There is a close relation with pricing and managing connections in ATM networks and IP networks. The main difference is that SLAs for differentiated services are of a more static nature and the level of performance guarantees can be loose. Hence admission control is less strict, and has the goal of ensuring an average level of performance. [21] presents an approach to manage and price SLAs for DiffServ [9,10] that uses a simple upper bound for the effective bandwidth of the conforming traffic as a proxy for resource usage. The bound considers an on-off approximation of the input traffic with a peak rate which depends on the traffic contract parameters (peak rate and token bucket parameters), while keeping the same mean rate. Usage charges for specific time periods are proportional to this approximation, and their calculation requires only measurements of volume. [22] attempts to solve the bandwidth provisioning problem for a service overlay network, which purchases bandwidth with certain QoS guarantees from individual network domains via bilateral SLAs to build logical end-to-end service delivery. The solution takes into account the SLA, service QoS, traffic demand distributions, and bandwidth costs. Analytical models and approximate solutions for both static and dynamic bandwidth provisioning are developed. It was found that for static bandwidth provisioning it is more beneficial to overprovision more bandwidth; however, it is inefficient in terms of resource usage if traffic demands are highly variable. In such kind of environments, the dynamic bandwidth provisioning model is better, albeit with more expensive network resource management. [23] studies path provisioning as a mechanism to deliver SLAs in IP differentiated services networks. It considers static SLAs, more likely to be used in ISP’s core networks where multiple traffic flows produce less dynamic aggregated behavior, since any significant change in the SLA causes re-computation of the provisioned paths. The path provisioning problem is partitioned into smaller problems, each handling a Diffserv class starting from EF [9,10]. First, the provisioned paths for the EF traffic are computed and pinned down, and the amount of available bandwidth on the links is correspondingly adjusted. The same procedure is repeated for the other DiffServ tra...
CAC. (a) The Company is the sole beneficial owner of the CAC acting solely on its own behalf and for its own account, and not as agent or broker, in selling the CAC to the Purchasers.
CAC. “CAC” means Cavalier Acceptance Company, LLC, an Alabama limited liability company.

Related to CAC

  • The Seller Subsection 14.01 Additional Indemnification by the Seller; Third Party Claims........................................... Subsection 14.02 Merger or Consolidation of the Seller..................

  • The Purchaser (a) is not an employee benefit or other plan subject to the prohibited transaction provisions of the Employee Retirement Income Security Act of 1974, as amended ("ERISA"), or Section 4975 of the Internal Revenue Code of 1986, as amended (a "Plan"), or any other person (including an investment manager, a named fiduciary or a trustee of any Plan) acting, directly or indirectly, on behalf of or purchasing any Certificate with "plan assets" of any Plan within the meaning of the Department of Labor ("DOL") regulation at 29 C.F.R. ss.2510.3-101; or

  • Receivables (a) No amount payable to such Grantor under or in connection with any Receivable is evidenced by any Instrument or Chattel Paper which has not been delivered to the Administrative Agent.

  • Seller For each Mortgage Loan, the seller of such Mortgage Loan pursuant to the Mortgage Loan Purchase Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.