Access Security Sample Clauses

POPULAR SAMPLE Copied 1 times
Access Security. 5.1 Contractor shall be held solely responsible for the security of the facility while on the premises and is also responsible for leaving the facility secure after performance of the cleaning service. 5.2 Contractor shall be held strictly responsible for keys issued. 5.2.1 No keys shall be duplicated. 5.2.2 Lost keys must be reported to the County immediately. 5.2.2.1 If Contractor loses any issued keys, Contractor shall be responsible for the re-keying of the facility as directed by the County. 5.2.3 Contractor shall return issued keys at the completion of the contract.
Access Security. All Email addresses provided in connection with interoperable system(s) user accounts must be associated to an approved email account assigned by the user's emergency management organization. The use of personal email accounts to support emergency messaging through IPAWS-OPEN is prohibited. • Upon approval of the MOA by FEMA, a COG account with COGID and Digital Certificate will be created and issued to the designated technical representative. All individuals with knowledge of these credentials must not share or alter these authentication mechanisms without explicit approval from IPAWS. • Every interoperable system user is responsible for remote access security as it relates to their use of IPAWS-OPEN and shall abide by these Rules of Behavior.
Access Security. Company will take reasonable security measures to protect the Protected Health Information from unauthorized access. Access to Company’s computer networks and systems and the Protected Health Information will be controlled via a user ID and password. COMPANY IS NOT RESPONSIBLE FOR ANY UNAUTHORIZED USE OR DISCLOSURE OF A USER ID OR PASSWORD, OR FOR ANY BREACH OF THIS ADDENDUM ARISING AS A RESULT OF ANY SUCH UNAUTHORIZED USE OR DISCLOSURE BY OR ON BEHALF OF CLIENT.
Access Security. Only the Researcher and Research Team should have access to MSSNG Data. MSSNG Data must not be stored on any removeable media, such as a USB thumb drive or external hard drive at any time.
Access Security. If a driver leaves a Store unlocked after a Key Drop Delivery, leaves keys in the lock or leaves a security system unarmed, Distributor will be charged [****] for each instance. The charge will be waived if the driver is not able to set an alarm due to a system malfunction or other cause beyond the reasonable control of the driver. The driver shall immediately inform Distributor’s Customer Service and the Store manager of such problem. The [****] charge will not be waived if the driver fails to timely notify such parties. If a Store experiences theft, burglary, vandalism or other loss as a result of a driver’s failure to secure a Store, Distributor will be liable for any resulting losses or damages to person or property.
Access Security. 5.1 Access privileges for all IT Systems is determined on the basis of employee levels of authority within Bitrix24 Company organization structure and the requirements of their job roles. Employees are not granted access to any IT Systems or electronic data which are not reasonably required for the fulfilment of their job roles. 5.2 All IT Systems (and in particular mobile devices including, but not limited to, laptops, tablets, and smartphones) are protected with a secure password or passcode, or such other form of secure log-in system as the IT Department may deem appropriate and approve. 5.3 All passwords are covered with the following security measures: a) Are at least 8 characters long; b) Contain a combination of upper and lower case letters,numbers, symbols; c) Changed at least every 90 days; d) Different from the previous password; e) Not obvious or easily guessed (e.g. birthdays or other memorable dates, memorable names, events, or places etc.); and f) Created by individual Users. 5.4 All IT Systems with displays and user input devices (e.g. mouse, keyboard, touchscreen etc.) are protected with a password protected screensaver that will activate after 5 minutes of inactivity.
Access Security. The Customer’s access to and use of the Site and the E-Banking Services is restricted to the Program Administrator(s) and designated Authorizer(s) and User(s), and the parties agree that the agreed security procedure to control access to and use of the Site and the E-Banking Services will be user IDs and passwords and, subject to the Bank’s approval, may include other forms of authentication that the Bank may from time-to-time decide to utilize. The Bank will provide the Customer with user IDs for Program Administrators, Authorizers and Users, and a password associated with each user ID will be initially assigned by the Bank in accordance with procedures designated by the Bank. As soon as reasonably practicable, the Customer must change the password initially assigned by the Bank in accordance with procedures designated by the Bank.
Access Security. 1. Tenant shall not place any additional lock or locks on any exterior door in the Premises or Building or on any door in the Building core within the Premises, including doors providing access to the telephone and electric closets and the slop sink, without La▇▇▇▇▇▇’s prior written consent. A reasonable number of keys to the locks on the doors in the Premises shall be furnished by Landlord to Tenant at the cost of Tenant, and Tenant shall not have any duplicate keys made. All keys shall be returned to Landlord at the expiration or earlier termination of this Lease. 2. Landlord may from time to time adopt appropriate systems and procedures for the security or safety of the Building, its occupants, entry and use, or its contents, provided that Tenant shall have access to the Building 24 hours per day, 7 days a week. Tenant, Tenant’s agents, employees, contractors, guests and invitees shall comply with Landlord’s reasonable requirements relative thereto. Tenant acknowledges that Property security problems may occur which may require the employment of extreme security measures in the day-to-day operation of the Common Areas. Accordingly, Te▇▇▇▇ ▇grees to cooperate and cause its employees, contractors, and other representatives to cooperate fully with Landlord in the implementation of any reasonable security procedures concerning the Common Areas. 3. Tenant and its employees, agents, contractors, invitees and licensees are limited to the Premises and the Common Areas. Tenants and its employees, agents, contractors, invitees and licensees may not enter other areas of the Project (other than the Common Areas) except when accompanied by an escort from the Landlord.
Access Security a. For vehicular access to the AOA, Lessee shall use Gate _ _, as marked on the attached Exhibit “A,” unless directed to do otherwise by Authority. b. Lessee shall not leave the area of any opened airfield perimeter gate until that gate has completely closed, if automatic, or has been closed and secured, if manual. c. Lessee shall be held responsible for any individual that gains access to the AOA through any gate or door the Lessee opened and failed to properly secure. Lessee is also responsible for any individual intentionally allowed to access the AOA through any gate or door. d. Lessee acknowledges and understands that the T-Hangar leased herein is located within the secured Air Operations Area (AOA) of the Airport. Lessee agrees to comply with all Federal Aviation Administration, Transportation Security Administration and Airport Authority Rules and Regulations. Lessee agrees that it will, by lease addendum, agree to such additional provisions as may be required, by the Airport. Lessee agrees to pay any penalties, fines or costs resulting from Lessee’s violation of any of said security regulation and to indemnify Authority from any such fines, penalties, or costs incurred by Authority for incidents that are due to lessee’s violation of any of the said security regulations. e. Lessee understands and agrees that access to the T-Hangars and ramp area may be obtained only through the use of authorized access media (Airport Identification Card). Vehicles and persons may gain access to the T-Hangar area only at assigned access points. All of Lessee’s employees, agents, and members who will be unescorted in the AOA, shall make application for and comply with all requirements of the Authority for the issuance of an Airport identification card. The card shall be in their possession at all times when they are within the AOA. Lessee shall “escort” any guests, invitees or other persons accompanying Lessee, in the manner set forth in Authority’s Rules and Regulations, at all times that said individuals are within the AOA. Lessee is responsible for all escorted persons. f. The Authority reserves the right to levy, upon thirty (30) days prior written notice, a surcharge to cover additional security costs incurred by the Authority to comply with federal regulations. Any surcharge levied shall not exceed 10% of the basic hangar rental rate.
Access Security. STI shall adhere to all AT&T access control requirements as defined in Section 4.1 Access of the MSA. STI utilizes a combination of access control ***.