Airfield Security Sample Clauses

Airfield Security. 12.1 Licensee shall be responsible for fully complying with any and all applicable present and/or future rules, regulations, restrictions, ordinances, statutes, laws, airport security agreements, and/or orders of any federal, state, and/or local governmental entity regarding airfield security. Licensee shall be responsible for Airport gates and doors that are controlled or used by Licensee. Licensee shall comply fully with applicable provisions of the Transportation Security Administration Regulations, 49 Code of Federal Regulations (“CFR”), Sections 1500 through 1550 and 14 CFR Part 129, if applicable, including the establishment and implementation of procedures acceptable to the Executive Director to control access to air operation areas in accordance with the Airport Security Program required by CFR Sections 1500 through 1550.
AutoNDA by SimpleDocs
Airfield Security. Lessee shall cooperate with City to maintain and improve Airport security, and shall cooperate in investigations of violations of state and local laws, ordinances, and rules and regulations, of any federal, state and/or local governmental entity regarding airport and airfield security. Lessee shall provide necessary assistance to, and cooperate with, City in case of any emergency. Lessee shall, upon request, provide City relevant information which will enable City to provide efficient and effective management in response to any airport or airfield emergency.
Airfield Security. 12 Section 13 Section 14 Assignments and Encumbrances.................................. Nondiscrimination and Equal Employment 13 Practices/Affirmative Action Program.......................... 13 Section 15 Living Wage Ordinance................................................ 16 Section 16 Service Contract Worker Retention Ordinance............. 18 Section 17 Alternative Fuel Vehicle Requirement Program.......... 18 Section 18 Compliance with All Applicable Laws......................... 18 Section 19 Business Tax Registration............................................. 19 Section 20 Taxes, Fees and Licenses.............................................. 19 Section 21 Disabled Access............................................................ 20 Section 22 Child Support Orders.................................................... 21 Section 23 Contractor Responsibility Program.............................. 21 Section 24 Training......................................................................... 21 Section 25 Labor Harmony ............................................................ 22 Section 26 Labor Compliance.......................................................... 23
Airfield Security. 74.1. Lessee shall be responsible for fully complying with any and all applicable present and/or future rules, regulations, restrictions, ordinances, statutes, laws, airport security agreements, and/or orders of any federal, state, and/or local governmental entity regarding airfield security. Lessee shall be responsible for the maintenance and repair of that portion of the Airport perimeter fence, including gates and doors, that are located on the Demised Premises or controlled by Lessee. Lessee shall comply fully with applicable provisions of the Transportation Security Administration Regulations, 49 Code of Federal Regulations ("CFR") Sections 1500 through 1550 and 14 CFR Part 129, including the establishment and implementation of procedures acceptable to the Chief Executive Officer to control access from the Demised Premises to air operation areas in accordance with the Airport Security Program required by CFR Sections 1500 through 1550. Further, Lessee shall exercise exclusive security responsibility for the Demised Premises and, if Lessee is an aircraft operator, do so pursuant to Lessee's Transportation Security Administration approved Aircraft Operator Standard Security Program used in accordance with 49 CFR, Parts 1510, 1540 and 1546.

Related to Airfield Security

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Card Security This Card may be used without a personal identification number (PIN) to make purchases. Therefore, if you lose your Card, someone will be able to use it. Protect your Card and PIN at all times.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!