Fire and Security Systems Sample Clauses

Fire and Security Systems. (a) To comply with the written requirements (whether notified or directed to the Landlord and then to the Tenant or directly to the Tenant) of the appropriate statutory authorities, the insurers of the Building and the Landlord in relation to fire and safety precautions affecting the Building, the Estate and the Basement. (b) To keep the Demised Premises supplied and equipped with such fire-fighting and extinguishing appliances as shall be required by Law, any appropriate statutory authority or the Landlord’s insurers or as shall be reasonably required by the Landlord and to maintain same to the satisfaction of the relevant party in efficient working order and at least once in every six months to cause any sprinkler system or other fire-fighting equipment in the Demised Premises to be inspected by a competent person. (c) Not to obstruct the access to or means of working any fire-fighting, extinguishing and other safety appliances for the time being installed in the Demised Premises or the means of escape from the Demised Premises or any adjoining or neighbouring property in case of fire or other emergency or to lock any fire door while the Demised Premises is occupied. (d) To be responsible for the security control in the Demised Premises and to comply with all reasonable written instructions and requirements of the Landlord, in relation to the security controls in the Building. (e) To ensure that, if any part of the Building and / or the Basement in which the Tenant’s staff, servants and agents work or use needs to be evacuated, its staff servants and agents are trained in the procedure for and shall assist such evacuations.
AutoNDA by SimpleDocs
Fire and Security Systems. (a) To comply with the requirements and reasonable recommendations (whether notified or directed to the Landlord and then to the Tenant or directly to the Tenant) of the appropriate local authority, the insurers of the Building and the Landlord in relation to fire and safety precautions affecting the Building. (b) To keep the Demised Premises supplied and equipped with such fire fighting and extinguishing appliances as shall be required by Law, any appropriate local authority or the insurers of the Building or as shall be reasonably required by the Landlord. (c) Not to obstruct the access to or means of working any fire fighting, extinguishing and other safety appliances for the time being installed in the Demised Premises or the means of escape from the Demised Premises in case of fire or other emergency.
Fire and Security Systems. Fire and security systems shall be available 24 hours per day, 365 days per year.
Fire and Security Systems. Tenant will be responsible to provide and pay for any fire or smoke detection and alarm systems and monitoring services required by local or other building codes. Landlord shall be notified by Tenant in writing at least 30 days in advance of any termination of said monitoring services. Evidence of the implementation and proper operation of fire alarm systems must be provided to Landlord upon reasonable request. Security and intrusion alarm systems and monitoring services will be the sole responsibility of the Tenant

Related to Fire and Security Systems

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Support and Services ISD and HC agree to the following conditions: A. HC agrees to the following for both the mathematics and English language arts courses: i. To share data and provide feedback regarding student success on entry‐level college mathematics and English language arts courses; ii. To train advisors to recognize and honor course(s) on school district transcripts; iii. To ensure that eligible students are counseled directly into college level mathematics, English language arts, and all other courses that require mathematics and English language arts college readiness; B. HC agrees to the following for the college preparatory mathematics courses: i. To provide the Student Learning Outcomes; ii. To provide the syllabi for the courses being offered. iii. To provide regular meetings between the HC faculty and ISD faculty teaching the course. C. HC agrees to the following for the college preparatory English language arts course: i. To provide the Student Learning Outcomes for Integrated Reading/Writing (INRW 0303) course; ii. To provide the syllabi, including types of essays required (i.e., expository, persuasive, and critical analysis). iii. To provide regular meetings between the HC faculty and ISD faculty teaching the course. D. ISD agrees to the following for both the mathematics and English language arts courses: i. To provide highly qualified instructors for the courses being taught; ii. To identify students who are not college ready as stated in HB 5; iii. To provide professional development and resources required to teach the mathematics and English language arts courses; iv. To identify successful completion of the course(s) on the student transcripts as determined by the State of Texas PEIMS number; v. To provide curriculum for the course that is consistent with HC Student Learning Outcomes; vi. To provide assistance with admission, enrollment, and financial aid applications; E. ISD agrees to the following for the college preparatory mathematics course: i. To teach a math course designed to focus on college mathematics (algebraic or non‐algebraic) concepts; ii. Require students to meet college readiness scores on the TSI Assessment; iii. To meet regularly with HC faculty. F. ISD agrees to the following for the college preparatory English language arts course: i. To teach an integrated Reading and Writing course that focuses on critical reading and college‐level writing; ii. Require students to meet college readiness scores on the TSI Assessment; iii. To meet regularly with HC faculty.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Background and Security Investigations 7.5.1 Each of Contractor’s staff performing services under this Contract, who is in a designated sensitive position, as determined by County in County's sole discretion, shall undergo and pass a background investigation to the satisfaction of County as a condition of beginning and continuing to perform services under this Contract. Such background investigation must be obtained through fingerprints submitted to the California Department of Justice to include State, local, and federal-level review, which may include, but shall not be limited to, criminal conviction information. The fees associated with the background investigation shall be at the expense of the Contractor, regardless of whether the member of Contractor’s staff passes or fails the background investigation. If a member of Contractor’s staff does not pass the background investigation, County may request that the member of Contractor’s staff be removed immediately from performing services under the Contract. Contractor shall comply with County’s request at any time during the term of the Contract. County will not provide to Contractor or to Contractor’s staff any information obtained through the County’s background investigation. 7.5.2 County, in its sole discretion, may immediately deny or terminate facility access to any member of Contractor’s staff that does not pass such investigation to the satisfaction of the County or whose background or conduct is incompatible with County facility access. 7.5.3 Disqualification of any member of Contractor’s staff pursuant to this Paragraph 7.5 shall not relieve Contractor of its obligation to complete all work in accordance with the terms and conditions of this Contract.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Background Screening and Security ‌ All Contractor employees and agents performing work under the Contract must comply with all security and other requirements of the Department.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Privacy and Security (a) Each of the Company and its Subsidiaries complies (and requires and monitors the compliance of applicable third parties) in all material respects with all applicable Laws relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”), whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners; and (ii) non-personally identifiable information, whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners. (b) Neither the Company nor any of its Subsidiaries uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information, in a manner which would materially breach or violate any Privacy Laws and materially and adversely impact the business of the Company and its Subsidiaries, taken as a whole. (c) To the Company’s knowledge, Persons with which the Company or any of its Subsidiaries have contractual relationships have not breached any agreements or any Privacy Laws pertaining to Personal Information and to non-personally identifiable information. (d) To the Company’s knowledge, the Company and its Subsidiaries take all commercially reasonable steps to protect the operation, confidentiality, integrity and security of their respective business systems and websites and all information and transactions stored or contained therein or transmitted thereby against any unauthorized or improper use, access, transmittal, interruption, modification or corruption, and there have been no material breaches of same. Without limiting the generality of the foregoing, each of the Company and its Subsidiaries (i) uses industry standard encryption technology and (ii) has implemented a comprehensive security plan that (1) identifies internal and external risks to the security of the Company’s or its Subsidiaries’ confidential information and Personal Information and (2) implements, monitors and improves adequate and effective safeguards to control those risks.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!