Access Monitoring. The Association may maintain or support certain activities in the Condominium designed to make the area safer than it otherwise might be, but the Association is not obligated to do so. Neither Seller, the Association nor any other common interest association or any predecessor, successor or any of them, or any of their affiliates, consultants, employees, officers, directors, agents, contractors or subcontractors, or their respective affiliates (collectively, the “Companies”)
(a) shall be held liable for any loss or damage because of a failure to provide adequate security or because of the ineffectiveness of security measures undertaken, (b) represents or warrants that any fire protection system, burglar alarm system or other security system designed by or installed according to guidelines established by any of them cannot be compromised or circumvented, or will prevent loss by fire, smoke, burglary, theft, hold-up, assault, or otherwise, or in all cases will provide the detection or protection for which the system is designed or intended or (c) makes any other representation or warranty, expressed or implied, including any warranty of merchantability or fitness for any particular purpose, relative to any fire, burglar or other security system. Purchaser, on behalf of Purchaser and all tenants, guests and other invitees of Purchaser, acknowledges and agrees that the Companies are not insurers and each purchaser, occupant and invitee of any unit in the Condominium assumes all risks for loss or damage to persons, the Unit, contents of Unit or other property owned by any of them which might or could have been prevented by any device or system referred to in this Section 21, or its proper functioning. The provisions of this Section 21 will survive the Closing.
Access Monitoring. The landlord uses electronic keycards. In connection with electronic access monitoring, personal data are processed; see Section 20 about how we process personal data.
Access Monitoring. Reasonable measures for monitoring networks and systems on which Community Data is stored, maintained, or transmitted and for maintaining access records. Such measures will include, without limitation, logging all privileged access (e.g., root or superuser level access) to such networks and systems.
Access Monitoring inspection CB4.1 The Grantee agrees to give the Commonwealth, or any persons authorised in writing by the Commonwealth: access to premises where the Activity is being performed and/or where Material relating to the Activity is kept within the time period specified in a Commonwealth notice; and permission to inspect and take copies of any Material relevant to the Activity. CB4.2 The Auditor-General and any Information Officer under the Australian Information Commissioner Act 2010 (Cth) (including their delegates) are persons authorised for the purposes of clause CB4.1. CB4.3 This clause CB4 does not detract from the statutory powers of the Auditor-General or an Information Officer (including their delegates). Policy intent Allows for inspection by the Commonwealth and Auditor-General in high-risk circumstances. Risk/s to be mitigated - Grantee obstruction in any investigation undertaken by or on behalf of the Commonwealth. OPTION 1 OPTION 2 CB5. Equipment and assets CB5.1 In this Agreement: Asset means any item of property purchased, leased, created or otherwise brought into existence wholly, or in part, with the use of the Grant [, excluding Activity Material [and/,] Intellectual Property Rights [and real property]]. CB5.2 The Grantee agrees to obtain the Commonwealth's prior written approval to use the Grant to purchase any item of equipment or Asset for $[insert] (including GST) or more, apart from those listed in the Activity Budget and/or detailed below: [insert list of approved equipment and assets] CB5.3 Unless otherwise agreed in writing by the Commonwealth, the Grantee must ensure that it owns any equipment or Asset acquired with the Grant. CB5.4 Unless to the extent the Commonwealth agrees otherwise in writing, the Grantee agrees to use the Asset for the purpose of the Activity. The Commonwealth may give its agreement subject to conditions and the Grantee must comply with any such conditions. CB5.5 The Grantee agrees to maintain a register of all Assets with a value of $[insert] (including GST) or more at the time of the Asset’s purchase, lease, creation or bringing into existence in the form specified below and to provide the register to the Commonwealth upon request. Item Number Description Date of acquisition Grant Contributions Other Contributions - Grantee Other Contributions – Third Parties Total Cost [insert reference] [insert description of the equipment or asset] [insert amount of Grant contributed to this item] [insert amount of Grantees...
Access Monitoring. Appropriate procedures and measures to monitor all access to Systems and Personal Data, including protocol analyzers for applications, network and servers, only by authorized VMT personnel, and to track additions, alterations, and deletions of Personal Data.
Access Monitoring. Appropriate procedures and measures to monitor all access to Systems and Raytheon Data, including protocol analyzers for applications, networks, and servers, only by authorized Seller personnel, and to track additions, alterations, and deletions of Raytheon Data.
Access Monitoring a) The information-processing systems used for the carrying out of the order from the order processor (client and server systems) are protected by authentication and authorization systems.
b) Identification and authentication information (in particular in the form of user names and passwords) that are connected with the access authorization on the information-processing systems used for the carrying out of the order are only assigned to the persons commissioned with the carrying out of the order and merely in the scope necessary for the respective task.
c) Each awarding of access authorizations is documented for the length of the order.
d) All accesses and identifications (“Accounts”) are awarded exclusively person-specific. The use of accounts by several persons (group accounts) is stopped fundamentally.
e) Identification and authentication information are used exclusively personally; a password contained in such information is awarded as an initial password and is immediately converted after the receipt by the authorized person corresponding to the determinations established in this Appendix to a password known only to the authorized person; any disclosure is stopped. If unauthorized persons receive access data, the order processor will immediately show this to the responsible party.
f) The choice of the passwords is done with sufficient complexity and quality. Sufficient complexity and quality means at least a length of ten (10) characters in the use of three of the following 4 categories (upper- and lowercase letters, figures and special characters), no use of generic terms or of personal names as well as the inadmissibility of at least the last three (3) passwords used.
g) The order processor will keep authentication data (in particular passwords and cryptographic keys) strongly secret toward unauthorized persons, preserve these not in plain text, and use this exclusively using an encryption corresponding to this appendix or as an irreversible cryptographic checksum (in particular in the storage and transfer in the network).
h) For the encryption, the AES algorithm with 256 bits and for passwords hashes of the HMAC algorithm with 512 bits are used.
i) Each surrender of hardware to the employee of the Contractor is documented for the length of the order.
Access Monitoring.
a) Covered California, in alignment with other California public purchasers and State Regulators, shall implement an access-monitoring strategy for all QHP issuers. The strategy shall analyze data available from CMS QRS program, provider directory, and the HEI, and may include additional monitoring tools, such as secret shopper surveys, deployed by Covered California to assess Covered California Enrollee experience.
Access Monitoring. The Landlord uses electronic keycards. To ensure that no unauthorized persons gain access to the landlord´s properties, and to secure the operation and maintenance of the system, the Landlord may register information about the keycard’s number, the date and time for the use of keycard, at which doors the keycard has been used, hereunder the number of attempts to use the keycard at doors which the keycard does not have access to, as well as the name of the card owner (i.e. the Sublessee) in certain cases. The Sublessee will be notified if it becomes necessary to obtain such information. The information will be deleted when storage is no longer necessary in accordance with the purpose of the storage. By contacting the landlord the Sublessee can request information about which information is registered and if applicable the Sublessee can request the information to be updated or changed if needed. The information may be transferred to the Landlord’s external supplier to the extent it serves the purpose related to the latter’s assistance regarding the storage of information and system management/error correction, and when access to the information is required or in correspondence with the legislation or in connection with the investigation of legal offenses.
Access Monitoring appropriate security measures and procedures for monitoring all access to Supplier’s information systems and UBS Data and for monitoring additions, alterations, deletions, and copying of UBS Data, including: · Making available to UBS, on request, all logs and records; and · Maintaining full records of system or applicable access attempts, both successful and failed.