We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Access System Sample Clauses

Access System. Subtenant acknowledges that Sublandlord currently has an access system monitoring access to the Project and the Building. Subtenant acknowledges that there are card readers installed throughout the Building and Project which are part of Sublandlord’s access system. Subtenant will not interfere with, adjust or damage any such card readers. To the fullest extent permitted under applicable law, Subtenant hereby acknowledges that, except for making the card key reader system available for Subtenant’s use and except for servicing and maintaining the system, Sublandlord shall not be responsible for providing access or security services to Subtenant, and that Subtenant shall be solely responsible for providing its own security service, if any. Subject to its review of plans therefore, Sublandlord consents to Subtenant’s installation of its own security and card reader system at the Subleased Premises; provided that at Sublandlord’s or Landlord’s option, Subtenant will remove such systems at the end of the Term. Sublandlord shall also, at its sole cost, promptly upon request by Subtenant, add the access keys of certain of Subtenant’s employees to the database of Sublandlord’s security system to allow Subtenant to access the freight elevator vestibule on the fifth (5th) floor. Sublandlord will provide Subtenant with one (1) card key for each workstation located in the Subleased Premises at no charge, and in the event Subtenant so requests, Sublandlord shall provide Subtenant with replacement card keys at a price of $10.00 per card.
Access System. Subtenant acknowledges that Sublandlord currently has an access system monitoring access to the Project and the Building. Subtenant acknowledges that there are card readers installed throughout the Building and Project which are part of Sublandlord’s access system. Subtenant will not interfere with, adjust or damage any such card readers. To the fullest extent permitted under applicable law, Subtenant hereby acknowledges that, except for making the card key reader system available for Subtenant’s use with card keys initially at no cost to Subtenant (Sublandlord will have a right to charge a reasonable fee for lost or replacement card keys) and except for servicing and maintaining the system, Sublandlord shall not be responsible for providing access or security services to Subtenant, and that Subtenant shall be solely responsible for providing its own security service, if any. Subject to its review of plans therefore, Sublandlord consents to Subtenant’s installation of its own security and card reader system at the Subleased Premises; provided that at Sublandlord’s or Landlord’s option, Subtenant will remove such systems at the end of the Term. Sublandlord shall also, at its sole cost, promptly upon request by Subtenant, add the access keys of certain of Subtenant’s employees to the database of Sublandlord’s security system to allow Subtenant to access the freight elevator vestibule on the second (2nd) floor. Sublandlord will provide Subtenant with one (1) card key for each workstation located in the Subleased Premises at no charge, and in the event Subtenant so requests, Sublandlord shall provide Subtenant with replacement card keys at a price of $10.00 per card.
Access System. Install card readers in the entry/front double door and rear double door of the building to include access panel, card readers, HID Proxcard, cabling and all electrical work associated. ARTICLE 1 BASIC LEASE PROVISIONS 1 ARTICLE 2 TERM/PREMISES/TERMINATION OF EXISTING LEASE 2 (a) Term/Commencement Letter 2 (b) Square Footage of Premises/Project 2 (c) Termination of Existing Lease 2 ARTICLE 3 RENTAL 3 (a) Basic Rental 3 (b) Increase in Direct Costs 3 (c) Definitions 4 (d) Determination of Payment 8 (e) Audit Right 8 (f) Tenant’s Obligation to Pay Additional Monthly Rent 9 (g) Calculation Requirements 9 (h) Form of Statements 10 ARTICLE 4 SECURITY DEPOSIT 10 ARTICLE 5 HOLDING OVER 11 ARTICLE 6 OTHER TAXES 11 ARTICLE 7 USE 11 ARTICLE 8 CONDITION OF PREMISES 12
Access System. Subtenant shall pay to Sublandlord as additional rent a monthly fee of Two Hundred Twenty Five and 00/100 Dollars ($225.00) for the use of the ADT Card Entry System (the "ADT System") currently in place at the Subleased Premises. This fee shall cover the initial set up of the system and normal monitoring. Subtenant shall buy from Sublandlord access cards for Subtenant's employees at a charge of Nine and 00/100 Dollars ($9.00) per card. Replacement cards shall be charged at the same rate as new cards. Subtenant shall also pay to Sublandlord as additional rent the costs for any additional administration of the ADT System by Sublandlord at the rate of Seventy and 00/100 Dollars ($70.00) per hour.
Access System. Outside of the Normal Business Hours, Building and floor access will be monitored by an electronic key security and access system installed and maintained by the Commission. The Commission shall be responsible for establishing and maintaining access control to the Building, including the Leased Premises.
Access System. Subtenant shall have the right to “tie in” Subtenant’s security system to the existing card reader system in place at the Building and Leased Premises in order to allow Subtenant to regulate access within the Third Floor Space. In connection therewith, Subtenant shall comply with and be subject to the provisions of Section 19 of the Sublease.
Access System. (a) On the Effective Date, Tenant hereby assigns, transfers, conveys and sets over unto Landlord, its successors and assigns, to have and to hold, all of Tenant's right, title and interest in and to the proximity card access system (including all software licenses and software programs received by Tenant for the operation of the system) for the Building, including entry and elevators (the "Access System"), together with all the rights and appurtenances thereto in anywise belonging to Tenant, including, without limitation, the Guarantee/Warranty executed by Allstate Alarm Co. on December 27, 2000 and DPR Construction, Inc. on December 12, 2000. Landlord shall use the Access System for the benefit of tenants in the Building, including Tenant, without additional charge, other than reasonable out-of-pocket expenses incurred by Landlord in connection with operation, maintenance and repair of the Access System. Landlord agrees to accept the Access System in its existing "as is" condition and Tenant makes no representations or warranties regarding the condition, operation, or effectiveness of the Access System. (b) Tenant represents and warrants to Landlord that (i) Tenant owns and has exclusive rights in the Access System free and clear of any and all liens, claims, encumbrances, leases, assignments or security interests of any nature or type not released at or prior to the Closing, (ii) Tenant has the full right and authority to transfer the Access System and to consummate or cause to be consummated the transactions contemplated by this Second Amendment, (iii) the transfer of the Access System does not violate any agreements to which Tenant is a party as of the date of this Second Amendment and will not violate any agreements to which Tenant is a party as of the Effective Date and (iv) Tenant does not need the consent of any other person or entity to transfer the Access System not obtained prior to the date hereof. Tenant agrees to indemnify, defend and hold harmless Landlord with respect to any and all claims, demands, causes of action, damages, liabilities or obligations of whatever nature, whether in law or in equity, Landlord suffers as a result of any third-party claim as to any matter constituting a breach of any of the representations made in the preceding sentence.
Access System. Landlord agrees to cause the Building to be ------------- constructed with a card reader type of entry system for after-hours access to the Building. Landlord also agrees to cause the installation of an after-hours telephone system such that after-hours visitors may contact tenants of the Building to gain access thereto. Tenant agrees to comply and to cause its employees, agents, invitees and contractors to comply with reasonable rules and regulations promulgated from time to time by Landlord regarding same, and Tenant agrees to pay Landlord's actual cost for the initial cards, if any, and for replacement cards issued to Tenant with respect to the system. The system may be updated or replaced with a system which provides comparable or better after- hours access from time to time in Landlord's reasonable discretion. Any costs relating to the system would be an Operating Expense, to the extent permitted pursuant to Article 4 hereof, unless caused by Tenant, its employees, agents, invitees or contractors.
Access System. All access to the Common Areas shall be on the Lenel card access platform. The parties acknowledge and agree that certain doors and elevators will require access scans by all occupants of the Building. The Commission may install infrastructure to properly direct an access scan to the appropriate reader system to allow or deny entry. Each party will be responsible for maintaining access data to allow appropriate access. The Commission’s Building Manager and Park Police shall have 24/7 access to all doors for the purpose of emergency response, provided that the Commission must alert the County to any such entry within the earlier of 8 hours of the entry or prior to the shift change for the Park Police or Building Manager entering the Leased Premises. When time allows, the Commission personnel will give adequate notice of planned entry into the Leased Premises. From time to time, the Commission may update or replace the Lenel card access system. When such update or replacement takes place, the County, at its sole cost shall ensure that its access system is compliant with the new Commission access system.

Related to Access System

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • PFPC System PFPC shall retain title to and ownership of any and all data bases, computer programs, screen formats, report formats, interactive design techniques, derivative works, inventions, discoveries, patentable or copyrightable matters, concepts, expertise, patents, copyrights, trade secrets, and other related legal rights utilized by PFPC in connection with the services provided by PFPC to the Fund.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Review Systems The Asset Representations Reviewer will maintain and utilize an electronic case management system to manage the Tests and provide systematic control over each step in the Review process and ensure consistency and repeatability among the Tests.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.