ESH and Physical Security Sample Clauses

ESH and Physical Security. Xxxxxxxx Rozen shall comply, and shall cause all Xxxxxxxx Rozen employees and Subcontractors to comply, with BP’s standard environmental, safety and health policies and physical security policies that are communicated to Xxxxxxxx Rozen from time to time.
AutoNDA by SimpleDocs

Related to ESH and Physical Security

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Physical and Environmental Security DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Essential Security Nothing in this Chapter shall be construed to: (a) require a Party to furnish or allow access to any information, the disclosure of which determines to be contrary to its essential security interests; or (b) preclude a Party from applying measures that it considers necessary for the fulfillment of its obligations under United Nation Charter for the maintenance or restoration of international peace or security, or the protection of its own essential security interests (19).

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Financial Security 5.4.1. To provide financial security the Company is entitled to request from the Client a confirmation of the verification of personal data submitted at the registration of a trading account. For this purpose the Company may at any moment ask the Client to submit a copy of a passport or other equivalent document, certified by a notary (at Company’s discretion).

  • Minuted note The working time bank agreement shall supplant the time and other limitations governing the granting of agreed elements of a working time bank unless otherwise agreed. The purpose of a working time bank is to support enterprise productivity and competitiveness, and to accommodate the individual working time needs of employees.

Time is Money Join Law Insider Premium to draft better contracts faster.