Access Control Services Sample Clauses

Access Control Services. Landlord currently provides basic access control services, which include card access, security patrols and limited camera surveillance. Landlord shall provide one access card, without charge but subject to change without notice, to each employee at the beginning of the Lease Term and to each new employee when they are employed. There will be a $15.00 charge, subject to adjustment without notice, to the Tenant for each card that needs to be replaced or changed for any reason, and that is not returned at the end of the Lease. Landlord will provide two keys to the locks on the corridor doors entering the Premises, with additional keys to be furnished by the Landlord at Tenant’s expense. The Landlord at Tenant’s expense shall provide any keys or locks needed within the Premises. Landlord and Tenant shall cooperate in good faith to coordinate access policies, procedures, and codes for employees, maintenance personnel, security personnel, and other persons who may need access to the Premises. Landlord’s security personnel shall have access to patrol and monitor all reasonable areas, including without limitation server rooms, boilers, chillers, telephone rooms, conduit areas, common areas, and office space. Notwithstanding the foregoing, any security services are provided at the complete discretion of the Landlord and are not to be construed as an obligation of the Landlord under the Lease, except that Landlord shall have the obligation to maintain and repair the card access equipment as part of the Operating Expenses (defined in Exhibit E) as long as Landlord uses such card system to control access to the building. Landlord reserves the right to change these services upon notice. Landlord shall not be held liable for any failure to provide security services or take other security measures for the Building or Park.
AutoNDA by SimpleDocs
Access Control Services. Landlord currently provides basic access control services, which include card access, security patrols and limited camera surveillance. Landlord shall provide access cards for Tenant and Tenant's employees, without charge but subject to change without notice, to Tenant at the beginning of the Lease Term. There will be a $25.00 charge, subject to adjustment without notice, to the Tenant for each additional card or for any card that needs to be replaced or changed for any reason or that is not returned at the end of the Lease. Landlord will provide two keys to the locks on the corridor doors entering the Premises, with additional keys to be furnished by the Landlord at Tenant's expense. Landlord reserves the right to change these services upon notice. Landlord shall not be held liable for any failure to provide security services or take other security measures for the Building or Park.
Access Control Services. Landlord shall provide reasonable access-control services for the Building in a first-class manner materially consistent with the services provided by landlords of the Comparable Buildings. As of the date hereof, Landlord’s access control services include manned access control service in the lobby of the Building twenty-four (24) hours a day, seven days a week, regular access control patrol services of the Common Areas and the exterior of the Building, and a key-card access system with secured turnstiles at the entry of each elevator bank located in the Building. Notwithstanding the foregoing, Landlord shall in no case be liable for personal injury or property damage for any error with regard to the admission to or exclusion from the Building or Real Property of any person. Subject to the terms of this Lease (including the Work Letter and/or Article 5 hereof, as applicable), Tenant may, at its own expense, install its own security system (“Tenant’s Security System”) in the Premises. Tenant may coordinate the Tenant’s Security System to provide that the Building’s system and the Tenant’s Security System will operate on the same type of key card, so that Tenant’s employees are able to use a single card for both systems, but shall not otherwise integrate the Tenant’s Security System with the Building’s system. Tenant shall be solely responsible, at Tenant’s sole cost and expense, for the monitoring, operation and removal of Tenant’s Security System, Notwithstanding anything contained herein to the contrary, Landlord shall at all times have access to the Premises, including, without limitation, for purposes of providing services required of Landlord pursuant to the terms of this Lease.
Access Control Services. The term "Access Control Services" means ----------------------- services performed on NRTC's behalf that (i) control NRTC Subscriber access to programming and other services transmitted over the Transponder Capacity, and (ii) provide report-back information related to NRTC Subscribers, including NRTC Subscriber program purchase data. Such services may be provided by HCSS, an Affiliate of HCG, or a subcontractor to or an assignee of HCG hereunder. A statement of work for the Access Control Services is set forth in Exhibit 2.03(a).
Access Control Services. Insight will provide full support (Level 1, 2, and 3) for the ISE, ACS and RSA servers currently hosted on HHSC platforms located at the Xxxxxxx Data Center (WDC), DIR NSOC and DR location(s). This service includes support for the administration and usability for the ISE and RSA applications as it applies to the HHSC network environment. This service will provide support for the capacity and availability planning in support of HHSC initiatives and expansion of the network. Insight will participate in RCA as required. This service includes support for execution of migration of network device management from Cisco ACS to Cisco ISE and/or similar technologies.

Related to Access Control Services

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Compliance Control Services (1) Support reporting to regulatory bodies and support financial statement preparation by making the Fund's accounting records available to the Trust, the Securities and Exchange Commission (the “SEC”), and the independent accountants. (2) Maintain accounting records according to the 1940 Act and regulations provided thereunder. (3) Perform its duties hereunder in compliance with all applicable laws and regulations and provide any sub-certifications reasonably requested by the Trust in connection with any certification required of the Trust pursuant to the Xxxxxxxx-Xxxxx Act of 2002 (the “SOX Act”) or any rules or regulations promulgated by the SEC thereunder, provided the same shall not be deemed to change USBFS’s standard of care as set forth herein. (4) Cooperate with the Trust’s independent accountants and take all reasonable action in the performance of its obligations under this Agreement to ensure that the necessary information is made available to such accountants for the expression of their opinion on the Fund’s financial statements without any qualification as to the scope of their examination.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Quality control system (i) The Contractor shall establish a quality control mechanism to ensure compliance with the provisions of this Agreement (the “Quality Assurance Plan” or “QAP”). (ii) The Contractor shall, within 30 (thirty) days of the Appointed Date, submit to the Authority’s Engineer its Quality Assurance Plan which shall include the following: (a) organisation, duties and responsibilities, procedures, inspections and documentation; (b) quality control mechanism including sampling and testing of Materials, test frequencies, standards, acceptance criteria, testing facilities, reporting, recording and interpretation of test results, approvals, check list for site activities, and proforma for testing and calibration in accordance with the Specifications for Road and Bridge Works issued by MORTH, relevant IRC specifications and Good Industry Practice; and (c) internal quality audit system. The Authority’s Engineer shall convey its approval to the Contractor within a period of 21 (twenty-one) days of receipt of the QAP stating the modifications, if any, required, and the Contractor shall incorporate those in the QAP to the extent required for conforming with the provisions of this Clause 11.2. (iii) The Contractor shall procure all documents, apparatus and instruments, fuel, consumables, water, electricity, labour, Materials, samples, and qualified personnel as are necessary for examining and testing the Project Assets and workmanship in accordance with the Quality Assurance Plan. (iv) The cost of testing of Construction, Materials and workmanship under this Article 11 shall be borne by the Contractor.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!