Airport Security Badges Sample Clauses

Airport Security Badges. As part of airport operations and security, the Contractor must obtain from the airport badging office Airport Security Badges for each of his employees, subcontractors, material men, invitees or any person(s) over whom Contractor has control, which must be visibly displayed at all times while at the airport. No person will be allowed beyond security checkpoints without a valid Airport Security Badge. Each such person must submit signed and properly completed application forms to receive Airport Security Badges. Additional forms and tests may be required to obtain Airport Drivers Certification and Vehicle Permits. The application forms will solicit such information as the Commissioner may require in his discretion, including but not limited to name, address, date of birth (and for vehicles, driver's license and appropriate stickers). The Contractor is responsible for requesting and completing the form for each employee and subcontractor employee who will be working at the Airport and all vehicles to be used on the job site. Upon signed approval of the application by the Commissioner or his designee, the employee will be required to attend a presentation regarding airport security and have his or her photo taken for the badge. The Commissioner may grant or deny the application in his sole discretion. The Contractor must make available to the Commissioner, within one day of request, the personnel file of any employee who will be working on the project. As provided in Aviation Security above, in order for a person to have an Airport Security Badge that allows access to the airfield or aircraft, a criminal history record check (CHRC) conducted by the Department of Aviation will also be required. The CHRC will typically include a fingerprint analysis by the Federal Bureau of Investigation and such other procedures as may be required by the TSA. Airport Security Badges, Vehicle Permits and Drivers Licenses will only be issued based upon properly completed application forms. Employees or vehicles without proper credentials may be removed from the secured area and may be subject to fine or arrest. Contractor will be jointly and severally liable for any fines imposed on its employees or its Subcontractors employees. In addition to other rules and regulations, the following rules related to Airport Security Badges, Vehicle Permits and Drivers Licenses must be adhered to:
AutoNDA by SimpleDocs
Airport Security Badges. AIRLINE shall be responsible for obtaining and providing any Transportation Security Administration (TSA) required and AVIATION administered criminal history record checks, security threat assessments, badging, vehicle decals, and/or other activities required to ensure their agents, employees, vendors, suppliers, service providers, directors, or officers are in compliance with the Airport Security Program, Title 20 Ordinance, TSA Regulations 49 CFR Parts 1500, 1520, 1540, 1542, 1544, 1546, 1548, and 1550, as promulgated, and the terms and conditions of this Agreement, as each may be modified from time to time.
Airport Security Badges 

Related to Airport Security Badges

  • Aircraft This peril includes self-propelled missiles and spacecraft.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Shipping Axon may make partial shipments and ship Axon Devices from multiple locations. All shipments are FOB shipping point via common carrier. Title and risk of loss pass to Agency upon Axon’s delivery to the common carrier. Agency is responsible for any shipping charges in the Quote.

  • Shipment Dell will ship the APEX System to the Site when included as part of the APEX Service. The terms and process for shipment and delivery of the APEX System will be stated in the applicable Service Offering Description.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!