DETROIT ARSENAL ACCESS Sample Clauses

DETROIT ARSENAL ACCESS. All contractor personnel entering the installation and requiring unesPOted access must have a valid purpose to enter and be sponsored by a U.S. Government organization or a contractor providing support on the installation. They must have their identity proofed and vetted through the National Crime Information Center (NCIC) database, and be issued, or in possession of an authorized and valid access credential from the Detroit Arsenal installation. At the discretion of the Senior Commander, U.S. Army Xxxxxxxx Detroit Arsenal, any individual known to have a criminal background involving violence or meets the disqualifying standards in the Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12 (31 Jul 2008), may be denied access to the Detroit Arsenal. Fingerprinting of employees and any other security procedures deemed necessary for the security of Detroit Arsenal (vehicle searches or x-raying packages, bags, briefcases) may be required based on the Force Protection Condition level at the time of access and whether the installation or building location is identified as a Restricted Area or Mission Essential Vulnerable Area (MEVA).
AutoNDA by SimpleDocs
DETROIT ARSENAL ACCESS. The Detroit Arsenal is a designated Controlled Restricted Area. All personnel must have an official purpose to enter the installation and must establish their identify with an acceptable credential (identity card). All personnel with a DoD Comman Access Card (CAC) or other DoD Uniformed Services Identification Card (USID) are deemed to have an inherent official purpose during official duty hours. Such personnel must still be identity vetted (matching CAC to person presenting) and verification of purpose of visit. All non-CAC/USID holder contractors must be sponsored by a government employee (civilian or military). The government employee sponsor must submit a Visitor Notification/Temporary Security Identification Badge Application (Garrision STA Form 17) to the installation Visitor Control Center (VCC) prior to accessing the installation. Prior to granting unescorted installation access to non-CAC/USID contractors, a check of records must be conducted through the National Crime Information Center (NCIC) Interstate Identification Index (III). This is the Army minimum baseline background check to for all contractors. This suitability screening through NCIC-III has been approved by the U.S. DOJ for vetting visitors to ensure the security of military installations. At the discretion of the Senior Commander, U.S. Army Xxxxxxxx Detroit Arsenal, any individual known to have a criminal background involving violence or meets the disqualifying standards in the Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12 (31 Jul 2008), may be denied access to the Detroit Arsenal. Fingerprinting of employees and any other security procedures deemed necessary for the security of Detroit Arsenal (vehicle searches or x-raying packages, bags, briefcases) may be required based on the Force Protection Condition level at the time of access and whether the installation or building location is identified as a Restricted Area or Mission Essential Vulnerable Area (MEVA).

Related to DETROIT ARSENAL ACCESS

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Authorized User Overview and Mini-Bid Process Project Based IT Consulting Services Contracts enable Authorized Users to use a competitive Mini-bid Process to acquire Services on an as-needed basis, for qualified IT Projects. Project Based IT Consulting Services may include, but will not be limited to projects requiring: analysis, data classification, design, development, testing, quality assurance, security and associated training for Information Technology based applications. See section 1.3 Out of Scope Work for a listing of projects expressly excluded from the scope of this Contract. An Authorized User Agreement for Project Based IT Consulting Services will be governed first by the terms and conditions specified in the OGS Centralized Contract and second by terms and conditions added to the Authorized User Statement of Work. Additional terms and conditions shall not conflict with or modify the terms and conditions of the OGS Centralized Contract. NYS Executive Agencies must adhere to all internal processes and approvals including, as required, approval from NYS Office of Information Technology Services. Other Authorized Users must adhere to their own internal processes and approvals. In accordance with Appendix B, section 28, Modification of Contract Terms, an Authorized User may add additional required terms and conditions to this Mini-Bid and resultant Authorized User Agreement only if such terms and conditions (1) are more favorable to the Authorized User and (2) do not conflict with or supersede the OGS Centralized Contract terms and conditions. Examples of additional terms and conditions include: • Expedited delivery timeframe; • Additional incentives, such as discount for expedited payment/Procurement Card use; and • Any additional requirements imposed by the funding source or Federal law.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.