Data streams, metadata Sample Clauses

Data streams, metadata skill information and document types with access control The discussion with the perspective users in the industry resulted in a list of information sources which are in general subject of access control. In many cases simple role based access control was not applicable. To verify that a questionnaire has been generated to give detailed information for the following elements:  System history tracks (recorded data streams)  Sensor definition data  Meta data that operate on the sensors  Formulas that calculate the derived sensor streams  Stream query editor  Collaboration invitation  Collaboration participation  Project deliverables in line with the project plan.  Project progress, status and performance reports  Project problem reports  Cost calculation related to the project  Project member definition  Change requests documentation related to the project.  Training MaterialMarketing material for promotion and dissemination activities.  Consultancy input if involved and related to the project  Design specification and functional requirements.  Design documents  Drawings or models  Maintenance and repair documentation  Skill and responsibility information within the project frame  Documents describing the User Acceptance Testing program. All these items can be subject for FDSDM initiated collaborations and requiring access of the users acting on events or alerts in the data stream to verify the behaviour or to identify the source and the reason of a failure and to take the right action to resolve the problem. There are elements which directly deal with the data stream its self and elements which might be stored in different systems like PLM, CAD, DMS or similar systems to give background information during collaboration sessions.
AutoNDA by SimpleDocs

Related to Data streams, metadata

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Metadata Bibliographical, structural & descriptive data of the Licensed Material as defined in Schedule 5.

  • Data Services In lieu of any other rates or discounts, the Customer will receive discounts ranging from 25% to 55% for the following Data Services: Access: Standard VBSII Guide local loop charges for DS-3 Network Services Local Access Services.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Links If The Services are made available through the Internet, the Financial Institution’s website may provide links to other websites, including those of Third Parties who may also provide services to You. You acknowledge that all those other websites and Third Party services are independent from the Financial Institution’s and may be subject to separate agreements that govern their use. The Financial Institution and Central 1 have no liability for those other websites or their contents or the use of Third Party services. Links are provided for convenience only, and You assume all risk resulting from accessing or using such other websites or Third Party services.

  • Data Integrity Contractor shall implement policies and procedures reasonably intended to ensure that Protected Health Information and Personally Identifiable Information in its possession is complete, accurate, and current, to the extent necessary for the Contractor’s intended purposes, and has not been altered or destroyed in an unauthorized manner.

  • Online Services Microsoft warrants that each Online Service will perform in accordance with the applicable SLA during Customer’s use. Customer’s remedies for breach of this warranty are in the SLA. The remedies above are Customer’s sole remedies for breach of the warranties in this section. Customer waives any breach of warranty claims not made during the warranty period.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • End User An “End User” is you, an individual or entity, which receives the Models from Licensee or Authorized Licensee User pursuant to this End User Agreement to use in the regular course of your affairs, but not for resale, modification, distribution or exploitation by third parties without AnyLogic’s prior written consent.

Time is Money Join Law Insider Premium to draft better contracts faster.