Access Monitoring. The Association may maintain or support certain activities in the Condominium designed to make the area safer than it otherwise might be, but the Association is not obligated to do so. Neither Seller, the Association nor any other common interest association or any predecessor, successor or any of them, or any of their affiliates, consultants, employees, officers, directors, agents, contractors or subcontractors, or their respective affiliates (collectively, the “Companies”) (a) shall be held liable for any loss or damage because of a failure to provide adequate security or because of the ineffectiveness of security measures undertaken, (b) represents or warrants that any fire protection system, burglar alarm system or other security system designed by or installed according to guidelines established by any of them cannot be compromised or circumvented, or will prevent loss by fire, smoke, burglary, theft, hold-up, assault, or otherwise, or in all cases will provide the detection or protection for which the system is designed or intended or (c) makes any other representation or warranty, expressed or implied, including any warranty of merchantability or fitness for any particular purpose, relative to any fire, burglar or other security system. Purchaser, on behalf of Purchaser and all tenants, guests and other invitees of Purchaser, acknowledges and agrees that the Companies are not insurers and each purchaser, occupant and invitee of any unit in the Condominium assumes all risks for loss or damage to persons, the Unit, contents of Unit or other property owned by any of them which might or could have been prevented by any device or system referred to in this Section 21, or its proper functioning. The provisions of this Section 21 will survive the Closing.
Access Monitoring. The landlord uses electronic keycards. In connection with electronic access monitoring, personal data are processed; see Section 20 about how we process personal data.
Access Monitoring. Reasonable measures for monitoring networks and systems on which Community Data is stored, maintained, or transmitted and for maintaining access records. Such measures will include, without limitation, logging all privileged access (e.g., root or superuser level access) to such networks and systems.
Access Monitoring inspection CB4.1 The Grantee agrees to give the Commonwealth, or any persons authorised in writing by the Commonwealth: access to premises where the Activity is being performed and/or where Material relating to the Activity is kept within the time period specified in a Commonwealth notice; and permission to inspect and take copies of any Material relevant to the Activity. CB4.2 The Auditor-General and any Information Officer under the Australian Information Commissioner Act 2010 (Cth) (including their delegates) are persons authorised for the purposes of clause CB4.1. CB4.3 This clause CB4 does not detract from the statutory powers of the Auditor-General or an Information Officer (including their delegates). Policy intent Allows for inspection by the Commonwealth and Auditor-General in high-risk circumstances. Risk/s to be mitigated - Grantee obstruction in any investigation undertaken by or on behalf of the Commonwealth. OPTION 1 OPTION 2 CB5. Equipment and assets CB5.1 In this Agreement: Asset means any item of property purchased, leased, created or otherwise brought into existence wholly, or in part, with the use of the Grant [, excluding Activity Material [and/,] Intellectual Property Rights [and real property]]. CB5.2 The Grantee agrees to obtain the Commonwealth's prior written approval to use the Grant to purchase any item of equipment or Asset for $[insert] (including GST) or more, apart from those listed in the Activity Budget and/or detailed below: [insert list of approved equipment and assets] CB5.3 Unless otherwise agreed in writing by the Commonwealth, the Grantee must ensure that it owns any equipment or Asset acquired with the Grant. CB5.4 Unless to the extent the Commonwealth agrees otherwise in writing, the Grantee agrees to use the Asset for the purpose of the Activity. The Commonwealth may give its agreement subject to conditions and the Grantee must comply with any such conditions. CB5.5 The Grantee agrees to maintain a register of all Assets with a value of $[insert] (including GST) or more at the time of the Asset’s purchase, lease, creation or bringing into existence in the form specified below and to provide the register to the Commonwealth upon request. Item Number Description Date of acquisition Grant Contributions Other Contributions - Grantee Other Contributions – Third Parties Total Cost [insert reference] [insert description of the equipment or asset] [insert amount of Grant contributed to this item] [insert amount of Grantees...
Access Monitoring a) The information-processing systems used for the carrying out of the order from the order processor (client and server systems) are protected by authentication and authorization systems.
Access Monitoring. Appropriate procedures and measures to monitor all access to Systems and Personal Data, including protocol analyzers for applications, network and servers, only by authorized VMT personnel, and to track additions, alterations, and deletions of Personal Data.
Access Monitoring. Appropriate procedures and measures to monitor all access to Systems and Raytheon Data, including protocol analyzers for applications, networks, and servers, only by authorized Seller personnel, and to track additions, alterations, and deletions of Raytheon Data.
Access Monitoring. The Landlord uses electronic keycards. To ensure that no unauthorized persons gain access to the landlord´s properties, and to secure the operation and maintenance of the system, the Landlord may register information about the keycard’s number, the date and time for the use of keycard, at which doors the keycard has been used, hereunder the number of attempts to use the keycard at doors which the keycard does not have access to, as well as the name of the card owner (i.e. the Sublessee) in certain cases. The Sublessee will be notified if it becomes necessary to obtain such information. The information will be deleted when storage is no longer necessary in accordance with the purpose of the storage. By contacting the landlord the Sublessee can request information about which information is registered and if applicable the Sublessee can request the information to be updated or changed if needed. The information may be transferred to the Landlord’s external supplier to the extent it serves the purpose related to the latter’s assistance regarding the storage of information and system management/error correction, and when access to the information is required or in correspondence with the legislation or in connection with the investigation of legal offenses.
Access Monitoring appropriate security measures and procedures for monitoring all access to Supplier’s information systems and UBS Data and for monitoring additions, alterations, deletions, and copying of UBS Data, including: · Making available to UBS, on request, all logs and records; and · Maintaining full records of system or applicable access attempts, both successful and failed.
Access Monitoring. Appropriate procedures and measures to monitor all access to Systems and Personal Data, including protocol analyzers for applications, network and servers, only by authorized MPP personnel, and to track additions, alterations, and deletions of Personal Data. [#Xxxx – to discuss issue of no tracking of additions or deletions of Personal Data, nor who made them – other than PC Data. Consider adding requirement that no changes are made without SPE approval albeit does not resolve the issue of unauthorised changes not being tracked. How do they track PCI Data changes and if that is the case, why not other Personal Data?]