Access and Security Requirements Sample Clauses

Access and Security Requirements. A. Airport Security: Contractor shall comply with all security requirements of the Transportation Security Administration (TSA), Federal Aviation Administration (FAA), United States Customs and Border Protection (USCBP), JWA security regulations, and all applicable federal, state and local regulations regarding airport security. Contractor is responsible for fines imposed by any regulatory agency as a result of Contractor’s failure to comply with applicable rules and regulations regarding airport security. If Contractor’s employees or its subcontractors’ employees are discovered in a secure area without a badge, then a fine of up to $10,000 may be imposed. Contractor may be required to obtain airport security clearance to perform work under this Contract. The Contractor, Contractor’s employees, and Contractor’s subcontractors much complete a Security Identification Display Area (SIDA) class to obtain an ID badge with Airport Operations Area (AOA) driving permit, if required, for access to secure areas and to drive on the airfield. At no time shall construction vehicles or equipment be driven or used without badged personnel in the immediate vicinity (i.e., within 100 feet). Personnel who drive vehicles on the airfield will be issued an Airport driving permit. All Contractor vehicles must be marked with a company logo. The Airport Security department will inspect the vehicles, and vehicle hangtags will be issued. B. Badge Acquisition: Prior to issuance of a security badge(s), designated Contractor personnel who will be working onsite at the Project site and engaged in the performance of work must pass JWA’s screening requirements, which include a Federal Bureau of Investigation (FBI) Criminal History Records Check (approximately $29 per person) and a Security Threat Assessment (approximately $11 per person). Upon successful completion of the background checks, Contractor’s designated personnel will be required to attend a 3-hour SIDA class and pass a written test. Those personnel who may be permitted by JWA to drive on the Airport Operations Area (AOA) perimeter road must also complete a Driver’s Training class and written test. JWA identification badges are not issued until designated Contractor personnel have: (1) complete appropriate application forms and submitted proof of identity and employment eligibility, (2) passed both background checks, (3) completed and passed appropriate classroom training, and
AutoNDA by SimpleDocs
Access and Security Requirements. A. Airport-Issued Badge Acquisition, Retention, and Termination: Prior to issuance of airport security ID Badge(s), designated Contractor personnel who shall be working on-site in JWA restricted areas and engaged in the performance of work under this Contract must pass JWA’s security screening requirements, which include fingerprinting to complete an F.B.I. Criminal History Records Check (CHRC) and a Security Threat Assessment (STA). Contractor should anticipate four to six weeks for new employees to receive an airport security ID badge which includes the following general steps: 1. Company designates at least two representatives as Authorized Signatories by submitting a letter on company letterhead using the airport’s template. 2. Subcontractors and tenant contractors must also have two Authorized Signatories at a minimum. 3. All company employees requiring unescorted access to restricted airport areas are scheduled for fingerprint appointments. 4. Background check fees are provided at the first appointment 5. Employees must provide two government-issued IDs at the first appointment. 6. STA and/or CHRC results are received. 7. All ID Badge applicants successfully passing the STA and/or CHRC are scheduled for required training. 8. ID Badge related fees are provided and any additional information requested is provided at the training appointment. 9. Upon successful completion of the required training, employees will receive their ID Badge. 10. Authorized Signatories are required to maintain the ID Badge process for the onboarding of future employees, employee ID Badge renewals, scheduling, and other actions detailed below. Contractor’s designated personnel must, at a minimum, complete the following required training based on contractors work to be provided and access areas:
Access and Security Requirements. Only the Supplier’s employees specifically assigned to perform the Services will be allowed on‐site at a Facility. Where required by a Purchaser, the Supplier will ensure that its representatives that come on‐ site at a Facility are reported to that Purchaser’s representative so that the Purchaser’s representative will be aware of who is on the site and the duration of the site visit.

Related to Access and Security Requirements

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable. 2. Provide service site(s) that will promote attainment of Contractor’s program objectives. Arrange the physical environment to support those activities. 3. Decrease program costs when possible by procuring items at no cost from County surplus stores and by accepting delivery of such items by County.

  • Collateral and Security Section 10.01.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.

  • E-Verify Requirements To the extent applicable under ARIZ. REV. STAT. § 41- 4401, the Contractor and its subcontractors warrant compliance with all federal immigration laws and regulations that relate to their employees and their compliance with the E-verify requirements under ARIZ. REV. STAT. § 23-214(A). Contractor’s or its subcontractor’s failure to comply with such warranty shall be deemed a material breach of this Agreement and may result in the termination of this Agreement by the City.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!