Dock Plates Sample Clauses

Dock Plates. The Company shall supply and maintain proper safe dock plates.
AutoNDA by SimpleDocs
Dock Plates. The Company shall supply and maintain proper safe dock plates. Section 38.25 Section 38.26 Section 38.27 Section 38.27 (a) Heat on the Dock All new terminals, which are opened after October 1, 1974, shall be heating systems capable of maintaining a dock temperature of forty-five (45) degrees Fahrenheit with the doors closed under normal winter conditions. It is agreed that any new Company terminals opening during the term of the Agreement which expired on September 30 th, 1974 will be subject to the provisions contained herein,

Related to Dock Plates

  • Přetrvající platnost This Section 3 “

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Přetrvávající platnost Tento odstavec 1.3 “Zdravotní záznamy a Studijní data a údaje” zůstane závazný i v případě zániku platnosti či vypršení platnosti této Smlouvy.

  • DHS Seal, Logo, and Flags The Contractor shall not use the Department of Homeland Security (DHS) seal(s), logos, crests, or reproductions of flags or likeness of DHS agency officials without specific FEMA pre-approval.

  • Sealing and Marking of Tenders 2.17.1 The Tenderer shall seal the original and each copy of the tender in separate envelopes, duly marking the envelopes as “ORIGINAL” and “COPY.” The envelopes shall then be sealed in an outer envelope.

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Video Surveillance All video surveillance will be directed by the YSU police department.

  • Software Casos de Uso Red Hat Enterprise Linux Desktop Red Hat Enterprise Linux Workstation Sistemas de computadoras personales con el fin principal de ejecutar aplicaciones y/o servicios para un usuario único que por lo general trabaja con una conexión directa al teclado y la pantalla. Nota: La implantación de autorizaciones asociadas de sistema Red Hat Network o Módulos de Gestión Inteligente en un sistema que no sea Red Hat Enterprise Linux Desktop o Workstation no es un Caso de Uso soportado.

  • FABRICATION Making up data or results and recording or reporting them.

Time is Money Join Law Insider Premium to draft better contracts faster.