Access Monitoring Sample Clauses

Access Monitoring. The Association may maintain or support certain activities in the Condominium designed to make the area safer than it otherwise might be, but the Association is not obligated to do so. Neither Seller, the Association nor any other common interest association or any predecessor, successor or any of them, or any of their affiliates, consultants, employees, officers, directors, agents, contractors or subcontractors, or their respective affiliates (collectively, the “Companies”) (a) shall be held liable for any loss or damage because of a failure to provide adequate security or because of the ineffectiveness of security measures undertaken, (b) represents or warrants that any fire protection system, burglar alarm system or other security system designed by or installed according to guidelines established by any of them cannot be compromised or circumvented, or will prevent loss by fire, smoke, burglary, theft, hold-up, assault, or otherwise, or in all cases will provide the detection or protection for which the system is designed or intended or (c) makes any other representation or warranty, expressed or implied, including any warranty of merchantability or fitness for any particular purpose, relative to any fire, burglar or other security system. Purchaser, on behalf of Purchaser and all tenants, guests and other invitees of Purchaser, acknowledges and agrees that the Companies are not insurers and each purchaser, occupant and invitee of any unit in the Condominium assumes all risks for loss or damage to persons, the Unit, contents of Unit or other property owned by any of them which might or could have been prevented by any device or system referred to in this Section 21, or its proper functioning. The provisions of this Section 21 will survive the Closing.
AutoNDA by SimpleDocs
Access Monitoring. The landlord uses electronic keycards. In connection with electronic access monitoring, personal data are processed; see Section 20 about how we process personal data.
Access Monitoring. Reasonable measures for monitoring networks and systems on which Community Data is stored, maintained, or transmitted and for maintaining access records. Such measures will include, without limitation, logging all privileged access (e.g., root or superuser level access) to such networks and systems.
Access Monitoring inspection CB4.1 The Grantee agrees to give the Commonwealth, or any persons authorised in writing by the Commonwealth: access to premises where the Activity is being performed and/or where Material relating to the Activity is kept within the time period specified in a Commonwealth notice; and permission to inspect and take copies of any Material relevant to the Activity. CB4.2 The Auditor-General and any Information Officer under the Australian Information Commissioner Act 2010 (Cth) (including their delegates) are persons authorised for the purposes of clause CB4.1. CB4.3 This clause CB4 does not detract from the statutory powers of the Auditor-General or an Information Officer (including their delegates). Policy intent Allows for inspection by the Commonwealth and Auditor-General in high-risk circumstances. Risk/s to be mitigated - Grantee obstruction in any investigation undertaken by or on behalf of the Commonwealth. OPTION 1 OPTION 2 CB5. Equipment and assets CB5.1 In this Agreement: Asset means any item of property purchased, leased, created or otherwise brought into existence wholly, or in part, with the use of the Grant [, excluding Activity Material [and/,] Intellectual Property Rights [and real property]]. CB5.2 The Grantee agrees to obtain the Commonwealth's prior written approval to use the Grant to purchase any item of equipment or Asset for $[insert] (including GST) or more, apart from those listed in the Activity Budget and/or detailed below: [insert list of approved equipment and assets] CB5.3 Unless otherwise agreed in writing by the Commonwealth, the Grantee must ensure that it owns any equipment or Asset acquired with the Grant. CB5.4 Unless to the extent the Commonwealth agrees otherwise in writing, the Grantee agrees to use the Asset for the purpose of the Activity. The Commonwealth may give its agreement subject to conditions and the Grantee must comply with any such conditions. CB5.5 The Grantee agrees to maintain a register of all Assets with a value of $[insert] (including GST) or more at the time of the Asset’s purchase, lease, creation or bringing into existence in the form specified below and to provide the register to the Commonwealth upon request. Item Number Description Date of acquisition Grant Contributions Other Contributions - Grantee Other ContributionsThird Parties Total Cost [insert reference] [insert description of the equipment or asset] [insert amount of Grant contributed to this item] [insert amount of Grantees...
Access Monitoring a) The information-processing systems used for the carrying out of the order from the order processor (client and server systems) are protected by authentication and authorization systems.
Access Monitoring. Appropriate procedures and measures to monitor all access to Systems and Personal Data, including protocol analyzers for applications, network and servers, only by authorized VMT personnel, and to track additions, alterations, and deletions of Personal Data.
Access Monitoring. Appropriate procedures and measures to monitor all access to Systems and Raytheon Data, including protocol analyzers for applications, networks, and servers, only by authorized Seller personnel, and to track additions, alterations, and deletions of Raytheon Data.
AutoNDA by SimpleDocs
Access Monitoring. The Landlord uses electronic keycards. To ensure that no unauthorized persons gain access to the landlord´s properties, and to secure the operation and maintenance of the system, the Landlord may register information about the keycard’s number, the date and time for the use of keycard, at which doors the keycard has been used, hereunder the number of attempts to use the keycard at doors which the keycard does not have access to, as well as the name of the card owner (i.e. the Sublessee) in certain cases. The Sublessee will be notified if it becomes necessary to obtain such information. The information will be deleted when storage is no longer necessary in accordance with the purpose of the storage. By contacting the landlord the Sublessee can request information about which information is registered and if applicable the Sublessee can request the information to be updated or changed if needed. The information may be transferred to the Landlord’s external supplier to the extent it serves the purpose related to the latter’s assistance regarding the storage of information and system management/error correction, and when access to the information is required or in correspondence with the legislation or in connection with the investigation of legal offenses.
Access Monitoring appropriate security measures and procedures for monitoring all access to Supplier’s information systems and UBS Data and for monitoring additions, alterations, deletions, and copying of UBS Data, including: · Making available to UBS, on request, all logs and records; and · Maintaining full records of system or applicable access attempts, both successful and failed.
Access Monitoring. Except as prohibited by law, the Bank may enter, search, and/or monitor at its discretion all computer and network equipment and any other computer or communications device provided by the Bank, including devices owned by any affiliate or other designee of Bank that are used to perform the Services pursuant to this Agreement with authorized or unauthorized access to any such resources. The Bank may also monitor the activities of any other computing device while that device is accessing the Bank’s computers or network. Notwithstanding the foregoing, if the Bank discovers malicious activity or has reasonable belief that the Supplier’s equipment was used to compromise the Bank’s network or computers, such equipment will be immediately disconnected from the Bank’s network or systems, and the Supplier will cooperate with the Bank, in a commercially reasonable way, to investigate such equipment. All Supplier Personnel, whether authorized or unauthorized, consent to the monitoring of their use of such resources and to the Bank’s access to and disclosure of any voice communications or data stored on such equipment. Further, no information, however classified, which is stored or transmitted using such equipment, will be considered private information of any employee or other person, except as required by law.
Time is Money Join Law Insider Premium to draft better contracts faster.