Dock Gate Security Sample Clauses

Dock Gate Security. Operator shall also manage all dock gates to ensure proper function and will re-set and adjust access code status as necessary to ensure proper security.
AutoNDA by SimpleDocs

Related to Dock Gate Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.

  • Adequate security The Contractor shall provide adequate security on all covered contractor information systems. To provide adequate security, the Contractor shall implement, at a minimum, the following information security protections:

  • Performance Security If our Tender is accepted, we commit to obtain a performance security in accordance with the Tendering document;

  • Fixed Rate Security Provisions Not applicable.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Financial Security 5.4.1. To provide financial security the Company is entitled to request from the Client a confirmation of the verification of personal data submitted at the registration of a trading account. For this purpose the Company may at any moment ask the Client to submit a copy of a passport or other equivalent document, certified by a notary (at Company’s discretion).

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Card Security This Card may be used without a personal identification number (PIN) to make purchases. Therefore, if you lose your Card, someone will be able to use it. Protect your Card and PIN at all times.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!