SECURITY GUIDELINES Sample Clauses
POPULAR SAMPLE Copied 1 times
SECURITY GUIDELINES. The following guidelines are designed to deal with the industrial relations difficulty that arise where security measures are taken concerning an employee suspected of dishonest practices. They should have application in normal situations but it ought to be understood that, if abnormal situations arise making it impossible for them to be adhered to, the union accept, in the place of the guidelines, such protective measures as are within the spirit of the guidelines but which may not be embraced within their written terms. The guidelines have no relevance to the questioning of staff in the ordinary course of employment concerning security matters unconnected with any liability by the employee whose assistance is being sought by the security personnel.
SECURITY GUIDELINES. In cooperation with the National Apartment Association, we would like to give you some important safety guidelines. We recommend that you follow these guidelines and use common sense in practicing safe conduct. Inform all other occupants in your dwelling, including any children you may have, about these guidelines
a. Lock your doors and windows--even while you are inside.
b. When answering the door, see who is there by looking through a window or peephole. If you do not know the person, first talk with him or her without opening the door. Do not open the door if you have any doubts.
c. If children (who are old enough to take care of themselves) are left alone in your apartment, tell them to use the keyless deadbolt and refuse to let anyone inside while you are gone--regardless of whether the person is a stranger or an apartment maintenance or management employee.
d. Do not put your name, address, or phone number on your key ring.
e. If you are concerned because you have lost your key or because someone you distrust has a key, ask management to rekey the locks. You have a statutory right to have that done, as long as you pay for the rekeying. You may not lockout anyone who has a lawful right to occupy the apartment.
f. Dial 911 for emergencies. If the 911 number does not operate in your area, keep phone numbers handy for the police, fire, and emergency medical services. If an emergency arises, call the appropriate governmental authorities first, and then call the management.
g. Check your smoke detector monthly to make sure it is working properly and the batteries are still okay.
h. Check your door locks, window latches, and other security devices regularly to be sure they are working properly.
i. If your doors or windows are unsecure due to break-ins or malfunctioning locks or latched, stay with friends or neighbors until the problem is fixed.
j. Immediately report to management—in writing dated and signed—any needed repairs of locks, latches, doors, windows, smoke detectors, and alarm systems.
k. Immediately report to management—in writing, dated and signed—any malfunction of other safety devices outside your apartment, such as broken gate locks, burned-out lights in stairwells and parking lots, blocked passages, broken railings, etc.
l. Close curtains, blinds, and window shades at night.
m. ▇▇▇▇ or engrave your driver's license number or other identification on valuable personal property.
n. Lock your doors while you are gone. Lock any door handle lock, ...
SECURITY GUIDELINES. 37.2.1 Both Parties will maintain accurate records, subject to audit, that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
37.2.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, user ID assignment, user request records, system configuration, time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate.
37.2.3 Each Party shall notify the other Party immediately upon termination of employment of an individual user with approved access to the other Party’s network.
37.2.4 Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party.
37.2.5 All physical access to equipment and Services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user’s access to either the CLEC or SBC-ASI/13State network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards.
37.2.6 Both Parties shall maintain accurate and complete records on the card access system or lock and key administration to the rooms housing the equipment utilized to make the connection(s) to the other Party’s network. These records will include management of card or key issue, activation or distribution and deactivation.
37.2.7 Each Party will monitor its own networ...
SECURITY GUIDELINES. The Evaluation Laboratory shall conduct all Evaluation Process tests through its Accredited Facilities and in accordance with this Agreement and the Security Requirements.
SECURITY GUIDELINES. 1. To provide restricted and protected access to the BDB Portal and to ensure secure communications within the BDB Portal Services, THE CUSTOMER will be responsible for following the procedures of authentication and security pre- established by THE BANK for the creation of the password and access to its web page. The password will act as a digital signature for every transaction made by THE CUSTOMER on the BDB Portal.
2. The creation and use of the password must be kept confidential and secure. It is THE CUSTOMER´S responsibility to secure, protect and maintain it in strict confidence. It should never be disclosed to unauthorized person(s) and should not be written down.
3. THE CUSTOMER should never leave the account information displayed in an area accessible by others and should never leave a logged on terminal unattended while using the BDB Portal Service. To prevent unauthorized access, THE CUSTOMER must sign-off the system as soon as the task is finished.
4. The BDB Portal Services has a feature that automatically disables the User ID and/or Password after three (3) consecutive unsuccessful log-on attempts have been made using an incorrect User ID and/or Password. THE CUSTOMER must contact our Operations Department at our toll free line 018000 116061 (dialing in Colombia) or ▇▇▇ ▇▇▇ ▇▇▇▇ (Contact Center Panama) to restore access. THE CUSTOMER will be solely responsible for actions resulting from the use or misuse of his User ID and PASSWORD.
5. THE BANK reserves the right to block access to the BDB Portal Services to maintain or restore security to its site and systems if we reasonably believe THE CUSTOMER´S access codes have been or may have been obtained or are being used or may have been used by unauthorized person(s). It is expressly agreed that if any person makes use of the service with the Password of THE CUSTOMER or his authorized person(s), THE CUSTOMER shall assume the consequences of such transaction(s).
6. The use of the service imposes on THE CUSTOMER and his authorized person(s) the obligation to identify themselves in full in accordance with the THE BANK´S requirements, follow the steps and procedures in force as established by the THE BANK and maintain in strict confidence the reports, codes and procedures which may come to their knowledge through the use of the BDB PORTAL and the PASSWORD.
7. THE CUSTOMER accepts immediately, without reservations, as full proof of the transactions carried out through the BDB PORTAL, each and every one...
SECURITY GUIDELINES. (1) Both Parties will maintain accurate records, subject to audit, that monitor user authentication and machine integrity and confidentiality , password assignment and aging, chronological logs configured, system accounting data, etc.).
(2) Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, user ID assignment, user request records, system configuration, time limits of user access or system interfaces. These records should be kept until the termination of this Agreement or the termination of the requested access by the identified individual. Either Party may initiate a compliance review of the connection records to verify that only the agreed to connections are in place and that the connection records are accurate.
(3) Each Party shall notify the other Party immediately upon termination of employment of an individual user with approved access to the other Party's network.
(4) Both Parties shall use an industry standard virus detection software program at all times. The Parties shall immediately advise each other by telephone upon actual knowledge that a virus or other malicious code has been transmitted to the other Party. All physical access to equipment and services required to transmit data will be in secured locations. Verification of authorization will be required for access to all such secured locations. A secured location is where walls and doors are constructed and arranged to serve as barriers and to provide uniform protection for all equipment used in the data connections which are made as a result of the user's access to either the CLEC or SBC-ASU8-State network. At a minimum, this shall include: access doors equipped with card reader control or an equivalent authentication procedure and/or device, and egress doors which generate a real-time alarm when opened and which are equipped with tamper resistant and panic hardware as required to meet building and safety standards.
SECURITY GUIDELINES. Is there information available concerning service protocol for the correctional facilities when service is performed under the conditions of this bid? See Answer to MSG94279 No.2.
SECURITY GUIDELINES. Security is performed by Carencro Police Officers at a charge of $30.00 per hour per officer. Security is REQUIRED at all functions with the exception of wedding showers, baby showers, birthday parties of less than 100 guests in attendance ONLY WHEN NO ALCOHOL is consumed, served or on the premises.
SECURITY GUIDELINES. You agree to maintain and regularly update the security of your Computer System using anti-virus software programs and other deterrent systems reasonably necessary to prevent unauthorized access to your Computer System. You agree to take reasonable precautions to prevent the introduction of any disabling procedures (including but not limited to software lock, malicious logic, worm, Trojan horse, bug, time bomb, etc.) into your software or our software. You are responsible for your failure to maintain or update the protection of your Computer System and we shall not be liable to you for any loss arising by reason of your failure to do so. Without limiting this provision in any way, you acknowledge and agree that the Services require you to communicate with us via electronic mail, the Internet, and/or other electronic means and that such communications could fall victim to interception and/or access by unauthorized third parties. We require you to utilize prudent and reasonable computer hardware and software security measures and Security Items (as hereinafter defined) and to follow certain minimum security practices and procedures ("Security Practices and Procedures") in order to reduce the risk of unauthorized access to and use of your accounts via the Services by third parties. YOU ACKNOWLEDGE AND AGREE THAT YOUR FAILURE TO UTILIZE SUCH COMPUTER HARDWARE AND SOFTWARE SECURITY MEASURES AND SECURITY ITEMS AND/OR TO FOLLOW SUCH SECURITY PRACTICES AND PROCEDURES SHALL RELIEVE US OF ANY LIABILITY TO YOU FOR UNAUTHORIZED ACCESS TO AND/OR USE OF YOUR ACCOUNTS OR UNAUTHORIZED TRANSACTIONS INITIATED ON YOUR ACCOUNTS THROUGH THE SERVICES. In order to maintain secure communications and reduce fraud, you agree to protect the security of your username, personal identification numbers, passwords, codes, marks, signs, public keys, or other means of identification (each, a "Security Item" and collectively, "Security Items") to access and/or use your accounts via the Services. Among other things, you agree to maintain and regularly update the security of your Computer System through which you access the Services, including, without limitation, by installing, maintaining, and regularly updating antivirus and antispyware identification and removal software. You shall take all commercially reasonable precautions to prevent the introduction of any disabling procedures (including, but not limited to, a software lock, malicious logic, worm, Trojan horse, bug, or time bomb) into...