System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Logging The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.
Load Shedding The Distributor may carry out Load Shedding in the following circumstances: (a) Maintenance of Network equipment: if the Distributor wishes to inspect or effect alterations, maintenance, repairs, or additions to any part of the Network, subject to clauses 4.6, 4.8, 4.10, and Schedule 5 as applicable; (b) Permitted by Service Standards: as permitted by the Service Standards, if the Customer has elected to receive an interruptible or otherwise non-continuous supply of electricity; (c) Compliance with instructions from the System Operator: (i) to comply with a request or instruction received from the System Operator in accordance with the Code; or (ii) if communication with the System Operator has been lost, and the Distributor reasonably believes that, had communication with the System Operator been maintained, the Distributor would have received a request or instruction from the System Operator to shed load in accordance with the Code; (d) Maintain security and safety: to maintain the security and safety of the Network in order to: (i) maintain a safe environment, consistent with the Distributor's health and safety policies; (ii) prevent unexpected short term overloading of the Network; (iii) prevent voltage levels rising or falling outside of legal requirements; (iv) manage System Security; and (v) avoid or mitigate damage to the Network or any equipment connected to the Network; (e) Compliance with the Code: to comply with the Code or the law; or (f) Other circumstances: for any other purpose that, in the Distributor’s reasonable opinion, and in accordance with Good Electricity Industry Practice, requires the interruption or reduction of delivery of electricity to any ICP.
Crane Erection & Jumping (a) Cranes and man/material hoists may be erected, altered, climbed and dismantled during times when ordinary production works are in progress subject to the work being done in full compliance with a relevant operational safety zone (OSZ) plan which has been developed specifically for that operation with consideration to overall site safety. (b) The crane crew for each tower crane (Crane Crew) must consist of the following: (i) crane driver; and (ii) three (3) dogmen. (c) In addition to the appropriate tickets held by the crane driver and the dogmen, the following high risk licences must be held amongst the Crane Crew: (i) rigging; and (ii) material handling. (d) Where a Project consists of a single Crane Crew, the Employer should endeavour to ensure another member of the Crane Crew holds a crane driver licence.
Fittings 2.2.1 Support structure and attachment fittings for the flap structure 2.2.2 Support structure and attachment fitting for the engine pylons 2.2.3 Support structure and attachment fitting for the main landing gear 2.2.4 Support structure and attachment fitting for the center wing box