Secure Location Clause Samples

The Secure Location clause defines the requirements and responsibilities for maintaining a safe and protected environment for certain assets, information, or activities. Typically, this clause specifies the physical or digital security measures that must be in place, such as restricted access, surveillance, or secure storage protocols. Its core practical function is to ensure that sensitive materials or operations are safeguarded against unauthorized access, theft, or damage, thereby reducing risk and ensuring compliance with security standards.
POPULAR SAMPLE Copied 2 times
Secure Location. Each Party shall keep the Confidential Information of the other Party in a secure location accessible only to its employees specifically authorized to have access pursuant to this License Agreement. Each Party shall ensure that its employees complies with the terms and conditions of this License Agreement and shall enter into agreements with such employees if necessary to give effect to this obligation.
Secure Location. Customer shall maintain adequate security measures to protect and store the physical original paper checks in a secure location, which access shall be limited to only those executive and managerial employees or officers of the Customer as is necessary to comply with Customer’s obligations under the terms of this Agreement.
Secure Location. MerlinOne shall maintain all hardware and software in a secured location(s). MerlinOne shall use its best efforts to prevent unauthorized access to the equipment and data used to operate the System, including, but not limited to, appropriate filters on network access paths and proper control of the physical environment.
Secure Location. Any in camera proceeding—includ- ing, but not limited to, a pretrial conference, motion hearing, status hearing, suppression hearing, substi- tution hearing, or appellate proceedingconcerning the use, relevance, or admissibility of classified infor- mation must be held in a secure location recommended by the classified information security officer and ap- proved by the court. The secure location must be within the federal court- house, unless it is determined that no available loca- tion in the courthouse meets, or can reasonably be adapted to meet, the security requirements of the Ex- ecutive Branch applicable to the level and category of classified information involved. In the event that no suitable location exists within the courthouse, upon recommendation by the classified information security officer, the court will designate another United States Government facility located within the vicinity of the courthouse, as the secure location. The classified information security officer must make necessary arrangements to ensure that the secu- rity requirements of the Executive Branch applicable to the level and category of classified information in- volved are met and must conduct or arrange for such inspection of the secure location as may be necessary. The classified information security officer must, in consultation with the United States Marshal, arrange for the installation of security devices and take such other measures as may be necessary to protect against any unauthorized access to or disclosure of classified information. All of the aforementioned activities must be conducted in a manner that does not interfere with the orderly proceedings of the court. Prior to any hear- ing or other proceeding, the classified information se- curity officer must certify to the court that the loca- tion to be used is secure.
Secure Location. Recipient shall keep the Materials under highly safe and secure conditions designed to prevent unauthorized use or access. Recipient must notify Kaiser as promptly as possible and, in any event, within twenty-four (24) hours by phone, and in writing within five (5) business days, after Recipient becomes aware of any access, use or disclosure of Materials that is not authorized by the Agreement and of any actual or suspected breach of Recipient’s security measures that may affect the Materials.
Secure Location. Parents and Students will discuss and determine secure locations to store the Computer when it is at home or away from school, and not in the Student’s immediate possession. Section 8: Violations, Consequences and Notification 8.1 Violations of the Agreement: Students who violate the terms of the Agreement will be subject to loss of access privileges and/or disciplinary action. Student violations will be judged on a case-­‐by-­‐case basis. Failure to use the Computer in an appropriate manner, as determined by school officials, will results in consequences.

Related to Secure Location

  • Project Location [Insert the location of the Project, if applicable]

  • Collateral Locations All of such Grantor’s locations where Collateral is located are listed on Exhibit A. All of said locations are owned by such Grantor except for locations (i) which are leased by the Grantor as lessee and designated in Part VII(b) of Exhibit A and (ii) at which Inventory is held in a public warehouse or is otherwise held by a bailee or on consignment as designated in Part VII(c) of Exhibit A.

  • Office Location During the Term, the Executive's services hereunder shall be performed at the offices of the Company, which shall be within a twenty five (25) mile radius of New York, NY, subject to necessary travel requirements to the Company’s offices in Toronto, Canada and other MDC Group company locations in order to carry out his duties in connection with his position hereunder.

  • Data Location 1.1. The CONTRACTOR shall not store or transfer non-public COUNTY data outside of the United States. This includes backup data and Disaster Recovery locations. The CONTRACTOR will permit its personnel and contractors to access COUNTY data remotely only as required to provide technical support. (Remote access to data from outside the continental United States is prohibited unless approved in advance and in writing by the County.) 1.2. The CONTRACTOR must notify the COUNTY in advance and in writing of any location changes to CONTRACTOR’s data center(s) that will process or store County data.

  • Service Location The services shall be performed at all contracting and participating facilities of the Contractor.