Load Control Sample Clauses

Load Control. 4.1.1 Deliver load control related documents between aircraft and airport buildings and vice versa.
AutoNDA by SimpleDocs
Load Control. Each Transmission Owner shall include in its respective load control area its share of the output of the Colstrip Units #1 and #2 and the Project. Montana shall include the Transmission System in its load control area.
Load Control. The PCS shall utilize the revenue meter (MWH) to trim the load on gas turbines selected by the operator to match the preselected load (energy) setpoint entered by the operator. The system will continously monitor, project, and adjust the load on the selected gas turbines to maintain a deviation between the setpoint and the actual delivered energy which does not exceed 1.8 MWh, or 0.9% of the Energy Request for a given hour (as defined in the Power Purchase Agreement), which ever is greater.
Load Control. Where the Customer elects to take Services under Charges which allows the Company to exercise Load Control, the Company reserves the right to exercise Load Control at any time without notice.
Load Control. 4.1.1; 4.1.2 (a,b,c,d,е,1, 2); 4.2.
Load Control. 4.02 All personnel who perform work in the following positions shall be included in the Cargo Services classification:
Load Control. A. Provide a load control detection system in accordance with EN 13452 to detect the LRV load and to automatically adjust acceleration and braking (excluding Security Brake) operations accordingly.
AutoNDA by SimpleDocs
Load Control. 10 11. Losses ......................................................................................................................... 10 12.

Related to Load Control

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain all summerfallow in a reasonably weed-free condition.

  • Fraud Control BellSouth will provide seven days per week, 24-hours per day, fraud monitoring on Calling Cards, xxxx-to-third and collect calls made to numbers in BellSouth’s LIDB, provided that such information is included in the LIDB query. BellSouth will establish fraud alert thresholds and will notify <<customer_name>> of fraud alerts so that <<customer_name>> may take action it deems appropriate.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer. Measures: • SAP uses controls and processes to monitor compliance with contracts between SAP and its customers, subprocessors or other service providers. • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • All SAP employees and contractual subprocessors or other service providers are contractually bound to respect the confidentiality of all sensitive information including trade secrets of SAP customers and partners.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Quality Control A. Controlled Affiliate agrees to use the Licensed Marks and Name only in connection with the licensed services and further agrees to be bound by the conditions regarding quality control shown in attached Exhibit A as they may be amended by BCBSA from time-to-time.

  • Cost Control The budget established by the OWNER for the construction of the Project and CONSULTANT fee shall be considered as absolute. The CONSULTANT shall advise OWNER in writing of the following:

  • Pest Control A. Whenever a department utilizes a pest control chemical in State owned or managed buildings/grounds, the department will provide at least forty-eight (48) hours notice prior to application of the chemical, unless an infestation occurs which requires immediate action. Notices will be posted in the lobby of the building and will be disseminated to building tenant contacts.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.