Disposal of Undelivered Baggage Sample Clauses

Disposal of Undelivered Baggage. In case baggage is unclaimed by a passenger within one week after its arrival, the Carrier may dispose of such baggage as deemed appropriate. Fish or other easily perishables may be disposed of if they are unclaimed within 48 hours after its arrival.
AutoNDA by SimpleDocs

Related to Disposal of Undelivered Baggage

  • GARBAGE DISPOSAL, RECYCLING, AND BIODEGRADABLE MATERIALS A. Concessionaire shall be responsible for maintaining the cleanliness of the Concession Premises. Concessionaire shall ensure placement of all garbage and trash generated by the Concession Operation in designated containers and that said containers are emptied daily, or as more frequently required by Department, at a location within the Area designated by Department. Disposal costs from this latter location shall be borne by Department. Concessionaire shall provide such additional trash containers as may be required to keep the immediate Concession Premises clean at all times. The type of trash containers provided by Concessionaire shall be approved by Department prior to use.

  • Tandem Transit Traffic 12.1 As used in this Section, Tandem Transit Traffic is Telephone Exchange Service traffic that originates on CBB's network, and is transported through Verizon’s Tandem to the subtending End Office or its equivalent of another carrier (CLEC, ILEC other than Verizon, Commercial Mobile Radio Service (CMRS) carrier, or other LEC (“Other Carrier”). Neither the originating nor terminating customer is a Customer of Verizon. Subtending End Offices shall be determined in accordance with and as identified in the Local Exchange Routing Guide (LERG). Switched Exchange Access Service traffic is not Tandem Transit Traffic.

  • Shared Transport The Shared Transport Network Element (“Shared Transport”) provides the collective interoffice transmission facilities shared by various Carriers (including Qwest) between end-office switches and between end-office switches and local tandem switches within the Local Calling Area. Shared Transport uses the existing routing tables resident in Qwest switches to carry the End User Customer’s originating and terminating local/extended area service interoffice Local traffic on the Qwest interoffice message trunk network. CLEC traffic will be carried on the same transmission facilities between end- office switches, between end-office switches and tandem switches and between tandem switches on the same network facilities that Qwest uses for its own traffic. Shared Transport does not include use of tandem switches or transport between tandem switches and end-office switches for Local Calls that originate from end users served by non- Qwest Telecommunications Carriers (“Carrier(s)”) which terminate to QLSP End Users.

  • Transit Traffic The following rates will apply:

  • Procurement Method (a) Quality-Based Selection (b) Selection under a Fixed Budget

  • Shift Rotation Routine shift rotation is not an approach to staffing endorsed by the Employer. Except for emergency situations where it may be necessary to provide safe patient care, shift rotation will not be utilized without mutual consent. If such an occasion should ever occur, volunteers will be sought first. If no one volunteers, the Employer will rotate shifts on an inverse seniority basis until the staff vacancies are filled.

  • Appropriation of Performance Security Upon occurrence of a Concessionaire Default, the Authority shall, without prejudice to its other rights and remedies hereunder or in law, be entitled to invoke, encash and appropriate the relevant amounts from the Performance Security as Damages for such Concessionaire Default. Upon such invocation, encashment and appropriation from the Performance Security, the Concessionaire shall, within [30 (thirty)] days thereof, replenish, in case of partial appropriation, to its original level the Performance Security, and in case of appropriation of the entire Performance Security provide a fresh Performance Security, as the case may be, and the Concessionaire shall, within the time so granted, replenish or furnish fresh Performance Security as aforesaid failing which the Authority shall be entitled to terminate this Agreement in accordance with Article 37. Upon replenishment or furnishing of a fresh Performance Security, as the case may be, as aforesaid, the Concessionaire shall be entitled to an additional Cure Period of [90 (ninety)] days for remedying the Concessionaire Default, and in the event of the Concessionaire not curing its default within such Cure Period, the Authority shall be entitled to invoke, encash and appropriate such Performance Security as Damages, and to terminate this Agreement in accordance with Article 37.

  • DELIVERY, STORAGE, AND HANDLING The Contractor shall be responsible to inspect all components on delivery to ensure that no damage occurred during shipping or handling for furnish and installation projects. For equipment only purchases, the ordering entity shall be responsible to inspect all components on delivery. Materials must be stored in original undamaged packaging in such a manner to ensure proper ventilation and drainage, and to protect against damage, weather, vandalism, and theft until ready for installation.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.