Level of Lifting Sample Clauses

Level of Lifting. Level of Lifting with respect to a Year shall be calculated in the form of percentage as per the following formula: Level of Lifting (LL) = (ACQ-DDQ) X 100 ACQ Where: LL = Level of Lifting of Coal by the Purchaser during the Year. DDQ shall have the same meaning as given in Clause 4.11.
AutoNDA by SimpleDocs
Level of Lifting. Reference:
Level of Lifting. Level of Lifting with respect to a Year shall be calculated in the form of percentage as per the following formula: Level of Lifting (LL) = (Σ (SQ ± VQ) -Σ DDQ) X 100 Σ(SQ ± VQ) Where: SQ = The Monthly Scheduled Quantity, in Tonnes, for such month; VQ = Increase / decrease over or under the Monthly Scheduled Quantity for such month pursuant to Clause – 3.5.2 and 3.5.3 for such month(s), expressed in Tonnes. LL = Level of Lifting of Coal by the Purchaser for the year. DDQ shall have the same meaning as given in Clause 3.10.

Related to Level of Lifting

  • End of Life Your right to use or obtain Support for the Software, and any Software features is subject to Our End-of-Life Policy. Upon the End-of-Life date of a Software Product or any feature of a Software Product (as We determine in accordance with the End-of-Life Policy), Your right to use or obtain Support for the Software or Software feature shall terminate.

  • Denial of Liability Executive acknowledges and agrees that neither the payment of the Severance Payment under the Agreement nor this Waiver and Release is to be construed in any way as an admission of any liability whatsoever by the Company or any of the other Released Parties, by whom liability is expressly denied.

  • Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.

  • SERVICE EXCLUSIONS All of an Employee's years of Service with the Employer shall be counted to determine the vested interest of such Employee except:

  • Retrenchment At any time during an individual’s service, the individual may be subject to retrenchment in accordance with the provisions of Article 22 of the Agreement. In such cases, the notice provisions and all other terms of that article shall apply, anything above to the contrary notwithstanding.

  • Alternate Traffic Routing If CLEC has a LIS arrangement which provides two (2) paths to a Qwest End Office Switch (one (1) route via a Tandem Switch and one (1) direct route), CLEC may elect to utilize alternate traffic routing. CLEC traffic will be offered first to the direct trunk group (also referred to as the "primary high" route) and then overflow to the Tandem Switch group (also referred to as the "alternate final" route) for completion to Qwest End Office Switches.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Provisioning Provisioning is the set of activities required to install, change or disconnect a Customer’s service. It includes the functions to establish or condition physical facilities as well as the completion of any required software translations to define the feature functionality of the service. Provisioning also involves communication between SPRINT and VERIZON on the status of a service order, including any delay in meeting the commitment date and the time at which actual completion of service installation has occurred. Measurements in this category evaluate the quality of service installations, the efficiency of the installation process and the timeliness of notifications to SPRINT that installation is completed or has been delayed.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

Time is Money Join Law Insider Premium to draft better contracts faster.