Airport Security Badging Process Sample Clauses

Airport Security Badging Process. (1) The Authority’s Aviation Security Unit is responsible for monitoring compliance with the safety and security regulations of Massport (740 CMR 30.00) and the TSA regulations (49 CFR Parts 1542, 1520, and 1540). Under these mandatory regulations, the Authority maintains an Airport Security Program to control individual and vehicular access to the restricted/secured areas of Xxxxx Airport. All individuals working at Xxxxx Airport must obtain an Airport ID badge and display as outlined in Massport’s rules and regulations. All individuals applying for an Airport ID badge must complete a Badge Application and pass a TSA Security Threat Assessment (“STA”). Information on the badge application is sent electronically to federal agencies responsible for vetting individuals with Airport issued identification media. The Airport’s Security Badge Office must receive proper clearances prior to the issuance of any Airport ID badge. Each sponsor company and individual is responsible for maintaining control and custody of airport-issued ID media including conducting badge audits, and will be subject to Massport and government sanctions for improper use and non-compliance. The Airport ID badge is the property of Massport and must be immediately returned to the Security Badge Office or the company’s Authorized Signatory upon expiration, termination, or upon the request of Massport. Failure to do so may result in fines and/or other sanctions. Each sponsor company will be required to have at a minimum of one Authorized Signatory. An Authorized Signatory is a designated representative authorized to sponsor individuals and request airport ID media from the Security Badge Office. The Authority requires all persons to wear and display on his or her outer garment an approved Massport airport ID badge. This requirement pertains to all employers, including, Massport, tenants, air carriers, service organizations, and contractors. The sponsoring company will comply with all current Massport and TSA security regulations currently in effect in those promulgated and implemented in the future. (2) A Public Side Identification (“PSID”) badge is required for all employees operating on Airport property without the need to access secure areas. The cost for each badge shall be the responsibility of the applicant or Operator. (3) Any change in personnel shall be reported to the Authority. The Operator shall promptly recover Airport keys and Security Identification Badges for all employees who...

Related to Airport Security Badging Process

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • Bidding Process 3.1. Bidding shall generally commence based on the sequence of the lot being shown on the PAH Website. However the Auctioneer has the right to vary the sequence without having to give prior notice to the intended bidders. 3.2. It shall be the responsibilities of the E-bidders to login through PAH website to wait for the turn to bid for the property lot in which they intend to bid. 3.3. The Auctioneer has the discretion to set a new reserve price in the event that there is more than one (1) registered bidder. 3.4. The amount of incremental bid will appear on the website prior to the commencement of the auction. 3.5. Registered online Bidders shall start bidding online by pressing the BID Button using their own gadgets with internet connection. If your bid is the highest, it will be denoted by a Green Coloured Box otherwise it will be a Red Coloured Box The highest bid shall flash 10 seconds (subject to change) interval for four (4) times " Calling Once, Calling Twice, Last Call and Sold". E-bidders may submit their bid at any of these stages of biddings by pressing the BID button. The successful bidder's bid will be denoted by a green coloured screen. The highest bidder shall be declared as the successful purchaser upon the fall of the hammer. 3.6. In the event that there is no bid after forty(40) seconds from the time of commencement of the auction, the auction shall be aborted. 3.7. Any bid once entered by the registered online E-bidders shall be binding and the bid shall not be withdrawn or retracted in any manner whatsoever after the fall of the hammer. 3.8. Both the successful and unsuccessful bidders will be notified by the Auctioneer through the website and also via E-mail where further directions are given in order to conclude the sale of the auction property. 3.9. In the event of any dispute, the decision of the Auctioneer shall be final and binding on all bidders. 3.10. Unsuccessful E-bidders shall have the deposit refunded to the same bank account from which the deposit transfer was made within two (2) working days from the date of auction. 3.11. The information shown and/or prompted on the screen handled by the PAH website in regards to the auction in particular the increment of the bidding price during the bidding process and the declaration of the successful bidder shall be final and conclusive.

  • Aircraft This peril includes self-propelled missiles and spacecraft.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • All new supplies equipment and services shall include manufacturer's minimum standard warranty unless otherwise agreed to in writing. Vendor shall be legally permitted to sell all products offered for sale to TIPS Members. All goods proposed and sold shall be new unless clearly stated in writing. The Vendor shall provide timely and accurate customer support for orders to TIPS Members as agreed by the Parties. Vendors shall respond to such requests within a commercially reasonable time after receipt of the request. If support andƒor training is a line item sold or packaged with a sale, support shall be as agreed with the TIPS Member. Most TIPS Members are tax exempt and the related laws andƒor regulations of the controlling jurisdiction(s) of the TIPS Member shall apply. No assignment of Agreement may be made without the prior notification of TIPS. Written approval of TIPS shall not be unreasonably withheld. Payment for delivered goods and services can only be made to the awarded Vendor, Vendor designated reseller or vendor assigned company.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Security Safeguards Contractor shall maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of District Data. Contractor shall store and process District Data in accordance with industry standards and best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in CIS Critical Security Controls (CIS Controls), as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation the Act, as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended, or such other standard as the District’s Chief Privacy Officer or designee may agree to in writing. Contractor shall also encrypt any backup, backup media, removable media, tape, or other copies. In addition, Contractor shall fully encrypt disks and storage for all laptops and mobile devices.

  • Interconnection Facilities Engineering Procurement and Construction Interconnection Facilities, Network Upgrades, and Distribution Upgrades shall be studied, designed, and constructed pursuant to Good Utility Practice. Such studies, design and construction shall be based on the assumed accuracy and completeness of all technical information received by the Participating TO and the CAISO from the Interconnection Customer associated with interconnecting the Large Generating Facility.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.