Security Cards for Physical Collocation Clause Samples

Security Cards for Physical Collocation. 3.23.1 The Physical Collocator’s employees and AT&T-21STATE AIS shall be permitted access to its collocated equipment seven (7) days a week, twenty-four (24) hours a day without a security escort. The Physical Collocator shall provide AT&T-21STATE with notice at the time of dispatch of its own employee or AT&T- 21STATE AIS to an Eligible Structure in accordance with applicable CLEC Handbook requirements. 3.23.2 The Physical Collocator will be required to submit a complete and accurate request form for Security Cards, access, keys and/or ID cards (also known as “Access Devices”), for the Physical Collocator’s employee and AT&T-21STATE AIS utilizing the appropriate request forms located on AT&T’s CLEC Online website. The Physical Collocator must submit to AT&T-21STATE the completed form for all employees and AIS requiring access to AT&T-21STATE’s Premises at least thirty (30) Days prior to the date the Physical Collocator desires to gain access to the Collocation space. 3.23.2.1 In an emergency or other extenuating circumstances (but not in the normal course of business), the Physical Collocator may request that AT&T-21STATE expedite the issuance of the access keys/cards and/or ID cards, and AT&T-21STATE will issue them as soon as reasonably practical. There may be an additional charge for such expedited requests as reflected in the Pricing Schedule. 3.23.3 Any access key/cards and/or ID cards provided by AT&T-21STATE to the Physical Collocator for its employees and AT&T-21STATE AIS may not be duplicated under any circumstances. 3.23.4 The Physical Collocator agrees to be responsible for all Access Devices issued to the Physical Collocator for its employees and AT&T-21STATE AIS contracted by the Collocator to perform work on the Collocator’s behalf. The Physical Collocator is responsible for the return of all Access Devices in the possession of the Physical Collocator’s employees and AT&T-21STATE AIS after termination of the employment relationship. The contractual obligation with the Physical Collocator ends, upon the termination of this Agreement, or upon the termination of occupancy of Collocation space in a specific AT&T-21STATE Premise.
Security Cards for Physical Collocation. 3.23.1 The Physical Collocator’s employees and AT&T-21STATE AIS shall be permitted access to its collocated equipment seven (7) days a week, twenty-four (24) hours a day without a security escort. The Physical Collocator shall provide AT&T-21STATE with notice at the time of dispatch of its own employee or AT&T- 21STATE AIS to an Eligible Structure in accordance with applicable AT&T CLEC Online Handbook requirements. 3.23.2 The Physical Collocator will be required to submit a complete and accurate request form for Security Cards, access, keys and/or ID cards (also known as “Access Devices”), for the Physical Collocator’s employee and AT&T-21STATE AIS utilizing the appropriate request forms located on AT&T’s CLEC Online website. The Physical Collocator must submit to AT&T-21STATE the completed form for all employees and AIS requiring access to AT&T-21STATE’s Premises at least thirty (30) calendar days prior to the date the Physical Collocator desires to gain access to the Collocation space.

Related to Security Cards for Physical Collocation

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.