AIRSECURE Sample Clauses

AIRSECURE. (Risk-based detection and filtration system for airports against airborne chemical, biological and radiological hazards), 2007, xxxx://xxx.0xxxxxxxx.xxx/airsecure ([AIR07]) AIRSECURE is a FP6 European Research project aimed at developing a high security detection and filtration solutions against airborne CBR threats at airports. The project was carried out in the period Sept 2005 – Sept 2007, with the participation of 7 partners from 5 EU Member States and the coordination of Lifa Air Ltd., Finland. The project recognises the vital role of airports to the social and economic development of European countries. To help maintain the free flow of passengers and goods effective security measures are needed to improve the protection against new terrorist threats. The AIRSECURE system that has been developed, forms a reliable, user friendly and cost-effective solution to protect airport passengers and workers against airborne biological, chemical or radiological hazards. The modular system is realized based on risk analysis and it gathers together the important aspects of protection: • Risk analysis methods for airborne threats in confined spaces. • Combination of high efficiency particulate filtration with novel gas phase filtration to an advanced filtration unit that offers continuous and efficient protection against chemical and biological hazards. • Low-cost particle detectors to monitor the performance of the filters to ensure the high protection level at all times. • Distribution of the filters at high risk areas where protection is mostly needed. • Utilization of distributed chemical detectors with central monitoring, to trigger alarms and to ensure timely response to imminent danger. The main idea of the AIRSECURE solution was to combine promising new filtration technologies for removal of both biological and chemical agents with a protective filtration unit. These distributed units can be flexibly and quickly installed in the supply or exhaust air ducts of the high-risk areas. The very low flow resistance of the filter allows its installation without extensive modifications to the ventilation systems. New particle detectors will be developed to monitor the performance of the filtration system for maximum security. The optimum number and location of both particle and gas detectors and protective filtration systems are based on risk analysis. The secure air-filtration and advanced warning systems can deter the attacks, and reduce the effects of a CBR agent...
AutoNDA by SimpleDocs

Related to AIRSECURE

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Mission COMMISSION in partnership with others, strengthens families, communities, and systems of services and supports so that all children in

  • Dewatering (a) Where the whole of a site is so affected by surface water following a period of rain that all productive work is suspended by agreement of the Parties, then dewatering shall proceed as above with Employees so engaged being paid at penalty rates as is the case for safety rectification work. This work is typically performed by Employees engaged within CW1, CW2 or CW3 classifications. When other Employees are undertaking productive work in an area or areas not so affected then dewatering will only attract single time rates. (b) Where a part of a site is affected by surface water following a period of rain, thus rendering some areas unsafe for productive work, consistent with the Employer’s obligations under the OH&S Act, appropriate Employees shall assist in the tidying up of their own work site or area if it is so affected. Where required, appropriate Employees will be provided with the appropriate PPE. Such work to be paid at single time rates. Productive work will continue in areas not so affected. (c) To avoid any confusion any ‘dewatering’ time which prevents an Employee from being engaged in their normal productive work is not included in any calculation for the purposes of determining whether an Employee is entitled to go home due to wet weather (refer clauses 32.4 and 32.5)

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • School Facilities 0000 X 00xx X, Xxxxx Xxxxx, XX 00000. The School shall provide reasonable notification to the Authorizer of any change in the location of its facilities.

  • Cybersecurity Training A. Contractor represents and warrants that it will comply with the requirements of Section 2054.5192 of the Texas Government Code relating to cybersecurity training and required verification of completion of the training program. B. Contractor represents and warrants that if Contractor or Subcontractors, officers, or employees of Contractor have access to any state computer system or database, the Contractor, Subcontractors, officers, and employees of Contractor shall complete cybersecurity training pursuant to and in accordance with Government Code, Section 2054.5192.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!