IT Physical Security and Access Control Sample Clauses

IT Physical Security and Access Control. The vendor must establish processes and procedures for physical access to and control of their own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Vendor employees are expected to: ▪ Comply with facility access procedures, using procedures such as sign-in/sign-out requirements and use of assigned ID badges. ▪ Scan ID badges, where applicable, at any secure door and/or entrance and exit gates, including any door or gate that may already be open. ▪ Refrain from using recordable media in conjunction with County-owned equipment. ▪ Comply with check-in/check-out requirements for materials and/or equipment. ▪ Adhere to the facility’s established emergency, safety and evacuation procedures. ▪ Report any unsafe conditions to the facility’s safety representative. ▪ Report any access violations or security threats to the facility’s local security administrator.
AutoNDA by SimpleDocs
IT Physical Security and Access Control. The vendor must establish processes and procedures for physical access to and control of their own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Vendor employees are expected to:
IT Physical Security and Access Control. The Contractor shall establish processes and procedures that are, at a minimum, consistent with best practices. Contractor employees are expected to:  Comply with facility access procedures, including sign-in/sign-out requirements and use of assigned ID badges  Scan ID badges at any secure door and/or entrance and exit gates, including any door or gate that may already be open  Refrain from using recordable media in conjunction with County-owned equipment  Comply with sign-in/sign-out requirements for materials and/or equipmentAdhere to a facility’s established emergency, safety and evacuation procedures  Report any unsafe conditions to the facility’s Department Safety Representative (DSR)  Report any access violations or security threats to the facility’s Local Security Administrator (LSA)
IT Physical Security and Access Control. The vendor must establish processes and procedures for physical access to and control of their own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Vendor employees are expected to: DocuSign Envelope ID: 2464DB96-258B-4365-A0E3-C78AF6EEDFF7 ▪ Comply with facility access procedures, using procedures such as sign-in/sign-out requirements and use of assigned ID badges. ▪ Scan ID badges, where applicable, at any secure door and/or entrance and exit gates, including any door or gate that may already be open. ▪ Refrain from using recordable media in conjunction with County-owned equipment. ▪ Comply with check-in/check-out requirements for materials and/or equipment. ▪ Adhere to the facility’s established emergency, safety and evacuation procedures. ▪ Report any unsafe conditions to the facility’s safety representative. ▪ Report any access violations or security threats to the facility’s local security administrator.
IT Physical Security and Access Control. 27 The vendor shall establish processes and procedures that are, at a minimum, consistent with best 28 practices. 29 30 Vendor employees are expected to: 32 ▪ Comply with facility access procedures, including sign-in/sign-out requirements and use
IT Physical Security and Access Control. The Contractor must establish processes and procedures for physical access to and control of the ir own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Contractor employees are expected to:  Comply with facility access procedures, using procedures such as sign-in/sign-out requirements and use of assigned ID badges.  Scan ID badges, where applicable, at any secure door and/or entrance and exit gates, including any door or gate that may already be open.  Refrain from using recordable media in conjunction with County-owned equipment.  Comply with check-in/check-out requirements for materials and/or equipment.  Adhere to the facility’s established emergency, safety and evacuation procedures.  Report any unsafe conditions to the facility’s safety representative.  Report any access violations or security threats to the facility’s local security administrator.
IT Physical Security and Access Control. 17 The vendor shall establish processes and procedures that are, at a minimum, consistent with best 18 practices. 19 20 Vendor employees are expected to: 22 ▪ Comply with facility access procedures, including sign-in/sign-out requirements and use 23 of assigned ID badges 24 ▪ Scan ID badges at any secure door and/or entrance and exit gates, including any door or 25 gate that may already be open 26 ▪ Refrain from using recordable media in conjunction with County-owned equipment 27 ▪ Comply with sign-in/sign-out requirements for materials and/or equipment
AutoNDA by SimpleDocs

Related to IT Physical Security and Access Control

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

Time is Money Join Law Insider Premium to draft better contracts faster.