Border Security Sample Clauses

Border Security. Xx. XXXXX. Mr. President, I rise to address an issue that transcends poli- tics and strikes at the very core of who we are as Americans. Throughout my time in Congress, I have made it my priority to work with my colleagues on both sides of the aisle, to look past partisanship, and to work toward passing commonsense leg- islation so we can help working fami- lies in Nevada and across our country. In the House, I was proud to be named one of the most bipartisan Members of Congress, and that is a title I plan to keep in the Senate. So I hope my colleagues recognize the seri- ousness of why I rise today. It is without partisan motivation when I say that we have a crisis on our hands. Make no mistake about it, there is a humanitarian crisis at our south- ern border and we are failing to address it. This administration is failing to ad- dress it. This Congress is failing to ad- dress it. With violence and political unrest in- creasing in the Northern Triangle countries of El Salvador, Honduras, and Guatemala, we are experiencing a surge in the number of migrants who have come to our southern border seek- ing refuge from violence and persecu- tion. More than 60 percent of migrants are families and unaccompanied children fleeing for their lives and seeking a safe place. Children and their families are coming to our country for the same reasons so many of our ancestors did— because they have no other choice. They are coming to the United States, a nation of immigrants, a nation built on a foundation of core values, and we do not turn away those fleeing persecu- tion and certain death. It is those same values that tell us that when children—including infants and toddlers—are at our doorstep, we do not put them in cages, tear them from their mother’s arms, let them go without showers, food, or medical at- tention, or let them sleep on cold floors. The reality is, Customs and Border Patrol officers are not trained to care for children, much less those who have experienced trauma. They are not pre- pared nor qualified to provide the much needed care to the families and chil- dren who are coming here. What is also true is that there are members of our Border Patrol and law enforcement who are trying to do the right thing. Those men and women signed up to protect our country from terrorism, narcotics, and foreign threats. They are not trained to take care of traumatized children. The fact remains, the state of things in these immigration facilities is untenable and indef...
AutoNDA by SimpleDocs
Border Security. This area focuses on:  Developing technologies, tools and advanced methods to balance immigration and commerce with effective border security, as well as assess threats and vulnerabilities,  Conducting research to improve surveillance, screening, detection, and identification at and near the border,  Developing tools and technologies to increase the efficiency and operational effectiveness of cargo security,  Develop biometric solutions for operational environments,  Enhancing border security decision-making strategies,  Examining human smuggling and human trafficking migration patterns and trends,  Analyzing the effectiveness of current border security policies,  Conducting analysis and assessments to enhance policy and law enforcement efforts as it related to border security, interior enforcement, and immigration and customs. Legitimate Trade and Travel. This area focuses on:  Developing tools that will enhance and streamline the flow of people and goods across a U.S. XXX without compromising security,  Examining the impact of the ongoing Export Control Reform Initiative on U.S. Government efforts to enforce export controls in support of countering the proliferation of weapons of mass destruction and other illicit materials,  Identifying and interdicting dangerous passengers and cargo from legitimate flows,  Conducting activities to better measure and understand the balance of trade facilitation, the expedited movement of commerce, and security,  Generating innovative ways to differentiate routinely between high- and low-risk people and goods.
Border Security 

Related to Border Security

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • CONTRACT SECURITY 8.2.1 The Contractor shall, prior to the Commencement Date or within the specified time, provide to the Owner any contract security specified in row D.2 of the Information Sheet.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Subprocessor Security Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

Time is Money Join Law Insider Premium to draft better contracts faster.