Secure Areas Clause Samples

The 'Secure Areas' clause defines the requirements and responsibilities related to areas within a facility or premises that are designated as restricted or protected for security reasons. Typically, this clause outlines who is permitted access to these areas, the procedures for granting or revoking access, and the obligations of parties to maintain the integrity and confidentiality of the secure zones. For example, it may require that only authorized personnel can enter server rooms or storage areas containing sensitive information. The core function of this clause is to safeguard critical assets and information by controlling and monitoring access, thereby reducing the risk of unauthorized entry or security breaches.
POPULAR SAMPLE Copied 1 times
Secure Areas. Contractor has a physical and environmental policy in place, with standards and guidelines that have been documented and obtained management approval, that is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; Contractor’s secure areas are protected by appropriate entry controls to ensure that only authorized personnel are allowed access; and Contractor’s physical protection and guidelines for working in secure areas have been adequately designed and applied. Contractor’s equipment, and the equipment Contractor may utilize in its operations that is owned by a third party, is maintained to ensure its continued availability and integrity; and Contractor’s security measures have been applied to off-site equipment to address the risks of working outside the Contractor’s premises. Contractor’s operating procedures have been documented, maintained, and made available to all users who require them; Contractor controls changes to information processing facilities and systems; and Contractor has segregated duties and areas of responsibility to reduce opportunities for unauthorized or unintentional modification or misuse of Contractor’s assets. Security controls, service definitions and delivery levels included in Contractor’s third-party service delivery agreements are implemented, operated, and maintained by the third party; and The services, reports and records provided by third parties are regularly monitored, reviewed and audited by Contractor.
Secure Areas i. Contractor has a physical and environmental policy in place, with standards and guidelines that have been documented and obtained management approval, that is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; ii. Contractor’s secure areas are protected by appropriate entry controls to ensure that only authorized personnel are allowed access; and iii. Contractor’s physical protection and guidelines for working in secure areas have been adequately designed and applied.
Secure Areas. Supplier will secure all areas, including loading docks, holding areas, telecommunications areas, cabling areas and off-site areas that contain Information Processing Systems or media containing Confidential Information by the use of appropriate security controls in order to ensure that only authorized personnel are allowed access and to prevent damage and interference. The following controls will be implemented: (a) Access will be controlled and restricted by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls. A record of all accesses will be securely maintained; (b) All personnel will be required to wear some form of visible identification to identify them as employees, Suppliers, visitors, et cetera; (c) Visitors to secure areas will be supervised, or cleared for non-escorted accessed via an appropriate background check. Their date and time of entry and departure will be recorded; and (d) Physically secure and maintain control over all paper and electronic media (e.g., computers, electronic media, paper receipts, paper reports, and faxes) that contain Company Data.
Secure Areas. The Contractor must ensure that there are defined physical perimeters and barriers, with physical entry controls and working procedures, to protect the premises, offices, rooms, delivery/loading areas etc of all areas in which the University Data are stored or Processed, against unauthorised access. The Contractor should seek specialist advice in order to put in place appropriate measures to mitigate the risk of and protect against fires, floods, earthquakes, bombs etc.
Secure Areas. Supplier Representatives who require access to consignment stock to audit or for other purposes shall hold a current DBS check, carry photo identity and notify a nominated person in advance of their requirement for access.
Secure Areas i. Contractors administer or assist in the administration of County programs; ii. PII is used or disclosed; or iii. PII is stored in paper or electronic format.
Secure Areas. Restrict, control and monitor all physical and logical areas in Consultant’s IT environments that contain City private and confidential information, servers, switches, developers and administrators’ work areas, or other operationally sensitive equipment (“Secure Area”). Physical Secure Areas controls are addressed are addressed in Physical Controls (Section 2.4). Logical Secure Areas controls are addressed in Technical Controls (Section 2.5) and Remote Access (APPENDIX D).
Secure Areas. Tenant may designate up to two (2) areas of the ------------ Premises totaling no more than five hundred (500) rentable square feet of space as "Secure Areas" should Tenant require such areas for the purpose of securing certain valuable property or confidential information. Notwithstanding any provision of this Lease to the contrary, Landlord may not enter such Secured Areas except in the case of emergency or in the event of a Landlord inspection, in which latter case Landlord shall provide Tenant with three (3) days' prior written notice of the specific date and time of such Landlord inspection. Tenant shall provide Landlord with a key for such Secure Areas (to be held pursuant to a security procedure reasonably satisfactory to Tenant) for Landlord's use for entry purposes in the event of an emergency.
Secure Areas. TrueCar will use commercially reasonably efforts to protect or cause to be protected all areas, including loading docks, holding areas, telecommunications areas, cabling areas and off-site areas that contain Information Processing System(s) or media containing Protected Information by the use of appropriate security controls to include, but not limited to: i. Access will be controlled by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls as determined by the TrueCar’s security risk assessment. A record of all accesses will be securely maintained for a minimum of 90 days. ii. All personnel will be required to wear some form of visible identification to identify them as employees, contractors, visitors, et cetera. (Note - Personal recognition of employees if possible is also acceptable.) iii. Visitors to highly sensitive areas such as data centers will be supervised, or cleared via an appropriate background check for non-escorted access. Date and time of entry and departure will be recorded and kept for a minimum of 90 days. [***] Information has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions.
Secure Areas. The Consultant must ensure that there are defined physical perimeters and barriers, with physical entry controls and working procedures, to protect the premises, offices, rooms, delivery/loading areas etc of all areas in which the University Data are stored or Processed, against unauthorised access. The Consultant should seek specialist advice in order to put in place appropriate measures to mitigate the risk of and protect against fires, floods, earthquakes, bombs etc.