Security Fence and Security System Clause Samples

Security Fence and Security System. The entire perimeter of the Site shall be enclosed by an appropriately designed security fence at least 2.2m in height and built according to best trade practice to a strength and security suitable for the facility protected. The fence shall enclose all Hazardous Areas. Note that a temporary fence is also required during construction to isolate the working area from the rest of the Owner's facility. Personnel access gates shall be provided at no less than three locations around the perimeter fence, each fitted with automatic entry control using Cardax card swipes and "breakglass" emergency opening. The Cardax system shall be connected to and fully integrated with the Wairakei Station Cardax system and shall automatically release in the event of a fire alarm in the Binary Plant area. One vehicle access gate shall also be automated. Other vehicle access gates may be manually operated and locked. The Contractor shall submit details of the permanent security fence design to the Owner for approval prior to construction.

Related to Security Fence and Security System

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).