Corporation’s Security Procedures Sample Clauses

Corporation’s Security Procedures. Contractor shall abide by Corporation’s security procedures, rules, and regulations. Contractor shall check-in with Corporation’s security on a daily basis to obtain identification badges which shall be worn by Contractor’s employees when present in or around the Center. Contractor shall observe access routes, entrance gates, parking, and temporary storage areas as designated by Corporation. No vehicles or equipment may be moved, handled, maintained or stored upon any area not authorized by Corporation.
AutoNDA by SimpleDocs

Related to Corporation’s Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Medical Procedures 1. No teacher shall be required to perform any medical procedures (including but not limited to bandaging cuts/abrasions, gastrostomy tube feedings, tracheostomy suctioning and catheterizations) on any student.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!