Security and Access Control Sample Clauses

Security and Access Control. Advanced security systems monitor the entire data centre 24x7. A closed circuit television system (CCTV) records and archives all activities. Each person accessing the data centre must provide valid identification and is registered when entering and leaving the premises.
Security and Access Control. ShadowVoice offers reliable, full featured hosted VoIP and SIP trunking for businesses from one line to thousands. Enterprise Systems offers a variety of security and access control solutions.
Security and Access Control. Contractor shall distribute keys and other access control devices to its employees and subcontractors only in accordance with the distribution policies established by District. Contractor shall be solely responsible for all keys or other access control device issued to its employees/subcontractors. Doors will be opened or unlocked only to areas in which Contractor’s employees/subcontractors are actively working. Doors will be locked and lights turned off once the Services are performed at the end of each day of operations. Contractor’s employees/subcontractors shall not open, unlock, or otherwise allow access to the Facilities for anyone not performing or supporting the Services without the express prior approval of District. In the event keys or other access devices issued to Contractor are lost or stolen, Contractor will report such losses to District immediately and will be liable for the cost of all replacements, including lock changes. Contractor shall not make copies of any keys to the Facilities without District’s express prior permission. Immediately upon the Completion Date, or as soon thereafter as practical, all keys and other access control devices issued to Contractor shall be returned to the appropriate College’s Campus Representative.
Security and Access Control. Customer is responsible for providing adequate security to prevent unauthorized System access control to Philips (or its third-party vendors) proprietary and confidential information.
Security and Access Control. 10.1 The Trustees might employ a security company to manage the security of the Scheme and to control access to and from the Scheme 10.2 Owners, occupiers and visitors will be subject to the security measures imposed by the Trustees from time to time relating to security and access control 10.3 Owners will bear the costs incurred by the Body Corporate in communicating from the access control point to the Owner. 5. By adding a new Rule 11
Security and Access Control. Overall, the BEAP’s security should comply with the following: - Government’s Security Regulations - Baseline IT Security Policy - IT Security Guidelines - OGCIO Interoperability Framework - Security Risk Assessment and Audit Guidelines
Security and Access Control. As part of the Software, Panzura will implement appropriate security procedures and controls to protect Customer Data from unauthorized access by physical and electronic intrusion as provided in the Panzura Security Addendum located at ▇▇▇▇▇://▇▇▇▇▇▇▇.▇▇▇/legal/security-addendum. Panzura will not, under any circumstances, be responsible or liable to Customer or any third party for (i) the removal of Customer Data from the Software by Customer or any third party of Customer; or (ii) any unauthorized access to the Software by third parties caused through illegal or illicit means by way of Customer’s network, infrastructure, or through Customer’s provisioning of credentials. Panzura will promptly report to Customer any unauthorized access upon discovery.
Security and Access Control. Where applicable, the Host School shall ensure Mobile Museum staff are provided with temporary visitor passes, restroom keys, or access codes necessary to utilize these facilities, subject to the Host’s standard safety and security protocols.
Security and Access Control. 12.1 All homeowners’ appointees and their staff must be registered on the security access system.
Security and Access Control. If you elect to install software on a wide area network or at a third-party data center, you must retain control of access to and use of the software by your users, and the hosting facility must use current industry standard security, encryption and protection mechanisms to prevent unauthorized access to the Software.