Entrance Control Sample Clauses

Entrance Control. The City will control the construction or use of any entrances along the Project within the City including those shown on the final Design Plans.
AutoNDA by SimpleDocs
Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on it. All other persons have access only after having registered before (e.g. at the main entrance). Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centres.
Entrance Control. The Processor’s EU based cloud provider conforms to ISO 27001 certifications and/or SSAE 16 SOC 1 Type II or SOC 2 to ensure secure entrance control. All offices are locked when unsupervised to prevent unauthorized access to Personal Data.
Entrance Control. The Sponsor will control the construction or use of any entrances along the Project within the Sponsor including those shown on the final Design Plans.
Entrance Control softgarden ensures that unauthorized persons have no access to the office, server and archive rooms. This is done by: Środki techniczne i organizacyjne opisane w art. 32 RODO nie są przeznaczone do użytku publicznego. Informacje te są dostępne tylko dla Inspektora Ochrony Danych osobowych w przedsiębiorstwie, dla odpowiednich organów nadzoru ds. ochrony danych oraz dla własnych upoważnionych pracowników danej jednostki przetwarzania danych. • DC: Centrum danych • B: Biuro softgarden Berlin
Entrance Control. Objective: No unauthorized entrance to data processing systems Existing / implemented measures: • Fence system (1) with driveway gate • Closed operating building units • Illumination of the property in the dark • Intrusion Detection System (IDS) with direct connection to security service (24/7/365) and emergency power supply (at least 24 h) • Access control system through personal transponder / door codes • Documented key controlAttendance records • Company´s and visitor´s badge control • Data protection obligations for employees • Data protection guidelines for visitors • Escort of visitors (external partners) • Video cameras (CCTV) with recording on motion, data memory 30 days • Emergency exit doors with day alarm • Labeling of data processing areas (SISP – Sensitive Storage and Processing Area) • Additional access controls of sensitive areas (archives, IT rooms) • Prohibition of image and voice recordings in the SISP areas. (1) Due to structural conditions and fire brigade driveways no or limited fencing is available in the archive centers Hamburg- Hammerbrook (high-rise bunker), Hamburg-Rahlstedt, Hofheim and Markt Schwaben.
Entrance Control softgarden ensures that unauthorized persons have no access to the office, server and archive rooms. This is done by: Les mesures techniques et organisationnelles décrites à l’article 32 du RGPD ne sont pas destinées au grand public. Ces informations ne sont accessibles qu’au délégué à la protection des données de la société, aux autorités de contrôle respectives en matière de protection des données et à leurs propres salariés autorisés de l’unité de traitement des données concernée.
AutoNDA by SimpleDocs
Entrance Control. Technical or organizational measures regarding access control, especially regarding legitimation of authorized persons: The aim of the entrance control is to prevent unauthorised people from physically accessing such data processing equipment which processes or uses Personal Data. Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorizations. They are monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on it. All other persons have access only after having registered before (e.g. at the main entrance). Access to special security areas such as the service centre for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centres
Entrance Control. Technical or organizational measures regarding access control, especially regarding legitimation of authorized persons: The aim of the entrance control is to prevent unauthorised people from physically accessing such data pro- cessing equipment which processes or uses Personal Data. Due to their respective security requirements, business premises and facilities are subdivided into different se- curity zones with different access authorizations. They are monitored by security personnel. Access for employ- ees is only possible with an encoded ID with a photo on it. All other persons have access only after having reg- istered before (e.g. at the main entrance). Access to special security areas such as the service centre for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security re- quirements for data centres

Related to Entrance Control

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain any summerfallow in a reasonably weed free condition.

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Erosion Control a. The Purchaser shall construct slash and debris erosion barriers, dips, water bars or ditches in skid trails and landings as directed by the Forest Officer. b. The kinds and frequency of erosion control structures shall be adjusted to soil types, topography and climatic conditions as directed by the Forest Officer. c. The Purchaser is required to recontour any excavated skid trails, and provide for effective erosion control in the trail location as directed by the Forest Officer. d. Erosion control work shall commence as soon as skidding is completed on each skid trail or landing, and must be kept current with unit operations. e. Erosion control work shall be completed and approved by the Forest Officer in unfinished units before operations cease for inactive periods including heavy winter snowfall, spring breakup and restricted dates. f. All erosion control work in each unit shall be completed prior to notification pursuant to Section VII.M.7.

  • Dust Control Dust-proof enclosures or partitions for protection wherever dusty or dirty work is performed and dampening of debris to avoid dusting when removed shall be provided and included as a cost of the work.

  • Control Area An electric power system or combination of electric power systems to which a common automatic generation control scheme is applied in order to: (1) match, at all times, the power output of the generators within the electric power system(s) and capacity and energy purchased from entities outside the electric power system(s), with the load within the electric power system(s); (2) maintain scheduled interchange with other Control Areas, within the limits of Good Utility Practice; (3) maintain the frequency of the electric power system(s) within reasonable limits in accordance with Good Utility Practice; and (4) provide sufficient generating capacity to maintain operating reserves in accordance with Good Utility Practice.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Pest Control Upon award, the Contractor shall manage all insect, weed and pest problems (as defined by Chapter 482, F.S.). In addition, any damage caused by pests during the implementation of the pest control program shall be immediately corrected by replacement with healthy turf or plants at the Contractor's expense. Pest Control program shall include, at a minimum, the following: 1) The Contractor shall inspect the entire property, including turf areas, shrubs, trees (including palms), and plants on a weekly basis for any pest infestation. All infestations, including disease, weeds, fire ants or other pests, shall be treated immediately upon discovery and notification by Performance Administrator or the Contractor. The County Performance Administrator must be informed of infestations discovered and treatments applied via email within 24 hours and included on the Monthly Vendor Inspection Report. All applications of pesticides shall be properly labeled by placards. 2) Application must comply with manufacturer’s recommendations. Every chemical substance used must be on the list of chemical substances or have been submitted for inclusion on such list, as compiled by the Environmental Protection Agency (EPA) pursuant to the Toxic Substances Control Act and in compliance with all Federal, State, and local pesticide laws and ordinances. Materials and application shall meet all Federal Health and Safety Laws currently in effect. Safety Data Sheets (SDS) must be submitted in writing two (2) days prior to contract start date or before the use of a new approved chemical intended for use on this contract. All chemicals used must carry an EPA approved number. 3) Pest Control Services shall be performed according to Integrated Pest Management Strategies to control all insect, wee, and pest problems as defined by all sections under Chapter 482, Florida Statues including proper licensure whether by the Contractor or a sub- contractor to be supplied with pre-bid package.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!