Physical Security Requirements Sample Clauses

POPULAR SAMPLE Copied 1 times
Physical Security Requirements. The router, Ethernet connection and/or dial-up phone connection is to be physically secured from tampering. If the equipment is located in a shared facility, the equipment shall be enclosed in a locked cabinet (for example, ▇▇▇▇▇▇▇ part number CTD364812 or equivalent).
Physical Security Requirements. The minimum physical security requirements are as follows:
Physical Security Requirements. Paragraphs 12.14 and 12.15 shall not be construed to require REMEC to violate any existing governmental rules or regulations for purposes of giving SpectraPoint access to its facilities.
Physical Security Requirements. Qualcomm will control and manage the access control devices and CCTV systems in the ODC space that is physically and logically separate from the Service Provider’s general systems. The Service Provider must provide a list of employees that require access to the °DC to complete their job duties for Qualcomm’s approval and authorization. When needed, Qualcomm reserves the right to re-key any applicable entry doors to the ODC space that would override the access control system. Qualcomm reserves the right to require, maintain, and control additional reasonable physical and logical security controls for the UDC during the term of the agreement. Additional controls will be implemented at Qualcomm’s expense, unless the additional controls are a direct result non-compliance with the provisions of this agreement, in which case the Service Provider will be responsible for the cost.
Physical Security Requirements. 1. SSA must store all NDNH information provided pursuant to this agreement in an area that is physically safe from access by unauthorized persons at all times. OCSE stores the agency finder file provided pursuant to this agreement in an area that is physically safe from access by unauthorized persons at all times. Policy/Requirements Traceability: HHS OCIO Policy for IS2P Handbook, PE; NIST SP 800-53 Rev 4, ▇▇-▇, ▇▇-▇ 2. SSA shall maintain a list of personnel authorized to access facilities and systems processing sensitive data, including NDNH information. SSA shall control access to facilities and systems wherever sensitive information is processed. Designated officials shall review and approve the access list and authorization credentials initially and periodically thereafter, but no less often than annually. OCSE maintains lists of personnel authorized to access facilities and systems processing sensitive information. OCSE controls access to facilities and systems wherever sensitive information is processed. Designated officials review and approve the access list and authorization credentials initially and periodically thereafter, but no less often than annually. Policy/Requirements Traceability: HHS OCIO Policy for IS2P Handbook, PE; NIST SP 800-53 Rev 4, AC-2, PE-2 3. SSA shall label printed reports containing NDNH information that denote the level of sensitivity of the information and limitations on distribution. SSA shall maintain printed reports in a locked container when not in use and never transport NDNH information off SSA premises. When no longer needed, in accordance with the retention and disposition requirements in the agreement, SSA shall destroy these printed reports by burning or shredding. OCSE does not generate printed reports containing the agency finder file information. Policy/Requirements Traceability: HHS OCIO Policy for Information Systems Security and Privacy (IS2P) Handbook, MP, MS; NIST SP 800-53 Rev 4, MP-3, MP-4, MP-5, MP-6 4. SSA shall use locks and other protective measures at all physical access points (including designated entry/exit points) to prevent unauthorized access to computer and support areas containing NDNH information. OCSE uses locks and other protective measures at all physical access points (including designated entry/exit points) to prevent unauthorized access to computer and support areas. Policy/Requirements Traceability: HHS OCIO Policy for IS2P Handbook, PE; NIST SP 800-53 Rev 4, PE-3
Physical Security Requirements. Vendor shall perform the Services in an environment mutually agreed upon by Company and Vendor and in compliance with Company’s commercially reasonable requests and applicable law. The aforementioned environment may include, but is not limited to, a request by Company for Vendor to provide a secure or physically segregated area in which to perform the Services. Vendor agrees that compliance with any commercially reasonable requests shall not be unreasonably withheld. The parties agree to meet and review the physical security of the APAC sites where the services are performed or will be performed, and agree to develop a Security Standards document which will be mutually acceptable to both parties. Such review and document completion will be completed no later than April 1, 2005. Only those employees of Vendor who are assigned to perform the Services hereunder or who have a valid business reason for being there shall be allowed access to the portion of the Call Center where the Services (the “Restricted Area”) are being performed. Each employee of Vendor authorized to access the Restricted Area will have a unique identification badge which will clearly identify them as an authorized employee of Vendor. For purposes of this Agreement the term “valid business reason” shall relate to (a) the management of the call center, or (b) related to the Company project as set forth on the applicable Project Schedule. If required by law, or upon mutual agreement by Company and Vendor, any area where potentially regulated pharmacy services will be performed shall be designated as a “Pharmacy,” and as such, access shall only be gained with the consent of and accompanied by either the DPP or the DPP’s designee, which shall be, at a minimum, a Pharmacist. No employee of Vendor shall have a key to a Pharmacy without the DPP’s consent.

Related to Physical Security Requirements

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Safety Requirements Prior to setting sail the Operator of the Sector 43 Vessel shall detail and identify any vessel safety operating procedures and 44 other important information to the assigned ASM. The Sector Member 45 acknowledges that an ASM must complete a pre‐trip vessel safety checklist 46 as provided by NMFS prior to leaving port. An ASM cannot be deployed on 1 a vessel that has failed to review the safety issues, and such vessel is 2 prohibited from leaving port without the ASM on board (unless a waiver is 3 granted). For the safety of the vessels captain, crew and the ASM; the ASM 4 will not be allowed on deck any time that gear is being deployed. 5 6 The Sector and its Members note that each ASM must be provided with all 7 the equipment specified by the NEFOP. It is the responsibility of the 8 individual ASM and its employer to ensure that all equipment is in good

  • Residency Requirements 1. All single first-year freshmen students are required to live in University housing for at least two academic semesters. All single students who have earned less than 30 credit hours and have not resided in University housing for two academic semesters are required to live on campus for two academic semesters. This policy does not apply to single first-year students who have been out of high school for more than one year, or to single first-year freshmen who live with their parents in Miami-Dade or Broward Counties. Neither does it apply to those students who, for disciplinary or administrative reasons, may be denied the privilege of continued residency on campus. 2. Undergraduate students residing in University housing must be regularly enrolled students of the University, taking a minimum of 12 credit hours each semester. Graduate students (when housed by exception) must carry a minimum of nine credit hours per semester. To apply and sign-up for University Village apartments, students must have 45 or more completed academic credits. In order to move into University Village, students must have 60 or more completed academic credits or have completed 4 academic semesters at the University and be achieving satisfactory academic progress as defined by the University Bulletin.