Additional Security and Access Requirements Sample Clauses

Additional Security and Access Requirements. Lessee shall, and shall cause all of its Subcontractors to, at all times comply with the identification, security, and other access requirements set forth on Exhibit D attached hereto.
AutoNDA by SimpleDocs

Related to Additional Security and Access Requirements

  • Additional security requirements The following provisions apply in respect of any Additional Security provided:

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Additional Requirements from Authorized Users An Authorized User may have distinct requirements that must be met by all individuals employed by or working for the Authorized User. The Contractor’s Staff Members will be expected to comply with these requirements as a condition of the placement.

  • RETENTION AND ACCESS REQUIREMENTS FOR RECORDS ADOF shall retain all records pertinent to this agreement for a period of no less than 3 years from the expiration or termination date. As used in this provision, records includes books, documents, accounting procedures and practice, and other data, regardless of the type or format. ADOF shall provide access and the right to examine all records related to this agreement to the U.S. Forest Service Inspector General, or Comptroller General or their authorized representative. The rights of access in this section must not be limited to the required retention period but must last as long as the records are kept. If any litigation, claim, negotiation, audit, or other action involving the records has been started before the end of the 3-year period, the records must be kept until all issues are resolved, or until the end of the regular 3-year period, whichever is later. Records for nonexpendable property acquired in whole or in part, with Federal funds must be retained for 3 years after its final disposition.

  • Control and Access to Information The Financial Mechanism Committee, the EFTA Board of Auditors and their representatives have the right to carry out any technical or financial mission or review they consider necessary to follow the planning, implementation and monitoring of programmes and projects as well as the use of funds. The Beneficiary State shall provide all necessary assistance, information and documentation.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Additional Service Requirements Grantee shall:

  • ADDITIONAL SPECIAL CONTRACT CONDITIONS A. Special Contract Conditions revisions: the corresponding subsections of the Special Contract Conditions referenced below are replaced in their entirety with the following:

Time is Money Join Law Insider Premium to draft better contracts faster.