Physical Security Arrangements Sample Clauses

Physical Security Arrangements. Ameritech may, at its sole discretion, adopt reasonable security arrangements to protect its equipment, including separating its equipment with a partition, installing security cameras or other monitoring devices, badges with computerized tracking systems, photo I.D., electronic or keyed access and/or logs. If any of the security arrangements adopted by Ameritech require the participation of Requesting Carrier’s employees (e.g., electronic access cards, or badges or photo I.D.), Requesting Carrier agrees on behalf of itself and its employees to comply with any rules applicable to such arrangements. Upon resignation, suspension, retirement or termination of any employee or technician that Requesting Carrier has secured badges or electronic access cards or keys to Ameritech’s Premises, Requesting Carrier shall recover said badge, access cards and/or keys from such individuals and return them to Ameritech. Ameritech may bill Requesting Carrier to change locks, badges or access cards due to these items not being returned to Ameritech. Ameritech shall recover its costs from Requesting Carrier to install, maintain and repair any security arrangements in the manner (i.e., nonrecurring or recurring) determined by the Commission. Any information collected by Ameritech in the course of implementing or operating security arrangements shall be deemed “Proprietary Information” and subject to the terms, conditions and limitations of Article XX.

Related to Physical Security Arrangements

  • Financial Security Arrangements At least 20 Business Days prior to the commencement of the design, procurement, installation, or construction of a discrete portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades, the Interconnection Customer shall provide the Connecting Transmission Owner, at the Interconnection Customer’s option, a guarantee, a surety bond, letter of credit or other form of security that is reasonably acceptable to the Connecting Transmission Owner and is consistent with the Uniform Commercial Code of the jurisdiction where the Point of Interconnection is located. Such security for payment shall be in an amount sufficient to cover the costs for constructing, designing, procuring, and installing the applicable portion of the Connecting Transmission Owner’s Interconnection Facilities and Upgrades and shall be reduced on a dollar-for-dollar basis for payments made to the Connecting Transmission Owner under this Agreement during its term. The Connecting Transmission Owner may draw on any such security to the extent that the Interconnection Customer fails to make any payments due under this Agreement. In addition: 6.3.1 The guarantee must be made by an entity that meets the creditworthiness requirements of the Connecting Transmission Owner, and contain terms and conditions that guarantee payment of any amount that may be due from the Interconnection Customer, up to an agreed-to maximum amount. 6.3.2 The letter of credit or surety bond must be issued by a financial institution or insurer reasonably acceptable to the Connecting Transmission Owner and must specify a reasonable expiration date. 6.3.3 Notwithstanding the above, Security posted for System Upgrade Facilities for a Small Generating Facility required to enter the Class Year process, or cash or Security provided for System Deliverability Upgrades, shall meet the requirements for Security contained in Attachment S to the ISO OATT.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • Physical Security BNY Mellon will deploy perimeter security such as barrier access controls around its facilities processing or storing Customer Data. The ISP will include (i) procedures for validating visitor identity and authorization to enter the premises, which may include identification checks, issuance of identification badges and recording of entry purpose of visit and (ii) physical security policies for personnel, such as a “clean desk” policy. In accordance with its ISP and applicable law, BNY Mellon will install closed circuit television (“CCTV”) systems and CCTV recording systems to monitor and record access to controlled areas, such as data centers and server rooms.

  • Physical Security of Media DST shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is Schedule 10.2 p.3 stored by DST (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on DST encryption policies.

  • Custody Arrangements The Trust or the Adviser shall notify the Subadviser of the identities of its custodian banks and the custody arrangements therewith with respect to the Subadviser Assets and shall give the Subadviser written notice of any changes in such custodian banks or custody arrangements. The Subadviser shall on each business day provide the Adviser and the Trust’s custodian such information as the Adviser and the Trust’s custodian may reasonably request in good faith relating to all transactions concerning the Subadviser Assets. The Trust shall instruct its custodian banks to (A) carry out all investment instructions as may be directed by the Subadviser with respect to the Subadviser Assets (which instructions may be orally given if confirmed in writing); and (B) provide the Subadviser with all operational information necessary for the Subadviser to trade the Subadviser Assets on behalf of the Fund. The Subadviser shall have no liability for the acts or omissions of the authorized custodian(s), unless such act or omission is required by and taken in reliance upon instructions given to the authorized custodian(s) by a representative of the Subadviser properly authorized (pursuant to written instruction by the Adviser) to give such instructions.