Hours security Sample Clauses

Hours security. 4. surveillance facility with CCTV 5. children's play area.
AutoNDA by SimpleDocs
Hours security. The Northwest Arts Center is open for business Monday through Thursday, 9am-4pm. There will be access to the building during rentals after regular business hours. A facility monitor will provide security in the building during non-business hours when rentals are scheduled. EXHIBITION POLICIES No exhibit is considered confirmed until approved by both parties. The Exhibitor is responsible for: ⬥ Preparing the exhibit materials so they arrive adequately protected and ready to be installed. ⬥ All aspects of installing and dismantling the entire exhibit. – Following all installation guidelines provided by the City. – Installing and dismantling during pre-arranged dates during business hours, Monday through Thursday 9am-4pm. – Covering the cost of repair of any damage caused during installation or dismantling of exhibit materials ⬥ Providing text for exhibit labels and introductory exhibition summary. ⬥ Storage cannot be provided for materials. ⬥ If the exhibitor does not remove materials at designated date and time, or within 72 hours of request to remove work, the City reserves the right to remove the material at the exhibitor’s sole expense and liability. If the exhibit materials remain unclaimed for more than seven days after removal, the City may sell or dispose of them without further obligation to the exhibitor. The City is responsible for: ⬥ Providing appropriate exhibition space ⬥ Oversight of installation process ⬥ Approval of exhibit design Limitations ⬥ The City will have final authority on all installation and dismantling determinations. ⬥ Please note that all works are displayed at the exhibitor’s own risk. The City does not accept responsibility for damage or loss of display materials. ⬥ Floors/walls must be completely protected during installation and dismantling. – No adhesive substances will be placed on floors/walls at any time. – Exhibitor will take particular care not to damage the floor during the installation, term of, or dismantling of, the Exhibition – Exhibitor will be responsible for the cost of repair of any such damage. Publicity Rights ⬥ Exhibitor hereby grants the City the right to use images from the Exhibition for publicity purposes in Exhibition announcements, the City’s internal publications (including but not limited to its newsletter), the City’s Website, and other media. ⬥ Exhibitor hereby represents and warrants that it has the full and unrestricted right to make said grant. ⬥ Exhibitor will indemnify and hold the City harm...

Related to Hours security

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Liquidated Damages Security The Board may require that a Member that has two (2) or more NMFS fishing regulation violations, or which has breached this Agreement or another sector’s operations plan on two (2) or more occasions, post a bond or obtain a letter of credit securing such Member’s payment and performance obligations under this Agreement in such amounts as the Board deems appropriate, or may require such Member to personally guaranty, and/or have other Members or third parties personally guaranty, such Member’s payment and performance obligations under this Agreement.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!