Facility Perimeter Security Sample Clauses

Facility Perimeter Security. Costs associated with external and/or internal police presence during regular or non- regular hours to secure the perimeter of the facility, to respond to a specific threat or for high-profile matters.
AutoNDA by SimpleDocs

Related to Facility Perimeter Security

  • Facility Security Contractor shall keep all doors locked while working in any buildings on the site. Keys shall not be left in the doors. Contractor shall not admit any person into the building that is not a direct employee of the Contractor and not actively engaged in performance of the Work. Contractor shall restrict access to the areas of the facility not specifically included in this Contract for construction services. The Contractor shall check all windows and doors for proper closure and locking, extinguish all lights except master security lighting, and then reactivate the security system (if applicable) prior to leaving the facility.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Premises Security 10.1 Security of premises and control of access.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Facility Prudential is willing to consider, in its sole discretion and within limits which may be authorized for purchase by Prudential Affiliates from time to time, the purchase of Shelf Notes pursuant to this Agreement. The willingness of Prudential to consider such purchase of Shelf Notes is herein called the “Facility”. At any time, the aggregate principal amount of Shelf Notes stated in Section 1.2, minus the aggregate principal amount of Shelf Notes purchased and sold pursuant to this Agreement prior to such time, minus the aggregate principal amount of Accepted Notes (as hereinafter defined) which have not yet been purchased and sold hereunder prior to such time, is herein called the “Available Facility Amount” at such time. NOTWITHSTANDING THE WILLINGNESS OF PRUDENTIAL TO CONSIDER PURCHASES OF SHELF NOTES BY PRUDENTIAL AFFILIATES, THIS AGREEMENT IS ENTERED INTO ON THE EXPRESS UNDERSTANDING THAT NEITHER PRUDENTIAL NOR ANY PRUDENTIAL AFFILIATE SHALL BE OBLIGATED TO MAKE OR ACCEPT OFFERS TO PURCHASE SHELF NOTES, OR TO QUOTE RATES, SPREADS OR OTHER TERMS WITH RESPECT TO SPECIFIC PURCHASES OF SHELF NOTES, AND THE FACILITY SHALL IN NO WAY BE CONSTRUED AS A COMMITMENT BY PRUDENTIAL OR ANY PRUDENTIAL AFFILIATE.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable.

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!