Card Reader Access System Sample Clauses

The Card Reader Access System clause establishes the requirements and procedures for controlling entry to a facility or specific areas using electronic card readers. It typically outlines who is authorized to receive access cards, how access permissions are granted or revoked, and the responsibilities of both users and administrators in maintaining security. By defining these protocols, the clause ensures that only authorized personnel can enter restricted zones, thereby enhancing security and reducing the risk of unauthorized access.
POPULAR SAMPLE Copied 2 times
Card Reader Access System. Subject to the applicable terms and provisions of this Lease, Tenant shall be permitted to install a security card reader access system at the entrances to the Premises and to connect such security card reader access system to the Building’s security system; provided, (i) Tenant shall be solely responsible, at Tenant’s sole cost and expense, for causing Tenant’s security system to be and remain compatible with the Building’s security system from time to time, and (ii) Tenant shall provide Landlord with not less than five (5) cards and/or other means of access in and to the Premises at all times during the Lease Term. Notwithstanding anything herein to the contrary, neither Landlord nor Landlord’s security service shall be obligated to investigate any breach of the card reader access system, nor shall Landlord’s security be responsible for any damage or theft in the Premises as a result of any such breach. This Schedule 1 and all equipment installed in accordance herewith are subject to Landlord’s prior written approval of the plans and specifications for any such installations and equipment, which approval shall not be unreasonably withheld. Any item installed in the Building in accordance with this Schedule 1 shall be deemed to be Supplemental Equipment and shall be subject to all the terms and conditions set forth in the Lease, including, without limitation, Paragraph 5 of Exhibit F, and accordingly shall be installed, maintained, repaired, and removed at Tenant’s sole cost and expense pursuant to the plans approved by Landlord. In the event of any conflict between the Lease and this Schedule 1, the Lease shall control.

Related to Card Reader Access System

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.