Infrastructure Components—Recovery Strategy Sample Clauses

Infrastructure Components—Recovery Strategy. Table 1: Infrastructure & Strategy Infrastructure Recovery Strategy Power & Utilities þ Recovery Strategies in an event of Loss of Power: - þ Auxiliary power available þ Multiple back-up options to enable us to run the facility without main power supply on an uninterrupted basis. þ Electrical supply into the facility is controlled through an auto-change over panel. þ Power backup is provided by 2 diesel-generating sets with the required fuel storage to keep the facility running on a continuous basis. Tie-ups with local vendors for fuel supply. þ All power supply to computers is provided from main UPS with n+1 redundancy arrangement. þ Servers are redundant across CPU, storage and power supply. Transport & Catering þ Recovery Strategies in an event of Loss of Transport and Catering: þ Transport facility is outsourced to multiple vendors for redundancy. þ Dedicated vendors for catering services within agreed delivery timelines during contingency situations. Fire Emergencies þ Recovery Strategies in an event of Fire and Medical Emergencies: - þ Arrangements with hospitals (24X7) a few miles from the office. Contact details are maintained at multiple points for nearby fire stations, blood banks, police station, 24-hour pharmacies etc. þ All fire safety arrangements are in place - Extinguishers, Fire Alarm system and Fire Hydrants within the facility with fire pump on stand by. There are multiple exits in the facility. Weather-related Site Shut Downs þ Recovery Strategies in an event of Natural Emergencies: - þ Arrangements for Employee staying at work already in place to cater to situations like floods or Terrorist attack. þ Facilities are RCC structures, thus they are resistant to any cyclonic influence and Earthquakes
AutoNDA by SimpleDocs

Related to Infrastructure Components—Recovery Strategy

  • Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Cellutell Communications, Inc. access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Cellutell Communications, Inc. to obtain the technical Version R4Q01: 12/01/01 capability to access and utilize BellSouth’s OSS interfaces. Specifications for Cellutell Communications, Inc.’s access and use of BellSouth’s electronic interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

  • Verizon Operations Support Systems Verizon systems for pre- ordering, ordering, provisioning, maintenance and repair, and billing.

  • Quality Monitoring 4.2.1. To prepare a Quality Assurance (QA) Plan

  • Loss Leader; Recycled Products Contractor shall not sell or use any article or product as a “loss leader” as defined in Section 17030 of the Business and Professions Code. If Contractor will sell to the Judicial Council, or use in the performance of this Agreement, goods specified in PCC 12207 (for example, certain paper products, office supplies, mulch, glass products, lubricating oils, plastic products, paint, antifreeze, tires and tire-derived products, and metal products), then with respect to those goods: (i) Contractor shall use recycled products in the performance of this Agreement to the maximum extent doing so is economically feasible, and (ii) upon request, Contractor shall certify in writing under penalty of perjury, the minimum, if not exact, percentage of post consumer material as defined in the PCC 12200, in such goods regardless of whether the goods meet the requirements of PCC 12209.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Processing operations The personal data transferred will be subject to the following basic processing activities:

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

Time is Money Join Law Insider Premium to draft better contracts faster.