Perimeter security Sample Clauses

Perimeter security. Firewalls and perimeter detection systems have been designed and deployed to help detect and prevent unauthorized access into our systems.
Perimeter security. All parts of the Egypt-Gaza border except the actual Rafah and Kerem Shalom crossings are excluded from the AMA. That being said, the EU and the Palestinians are seeking the National Security Force (or other Palestinian security) presence along the Philadelphi corridor to secure their movement, as well as to ensure that the equipment installed between the Liaison Office and Rafah is not stolen or damaged again. • Smuggling: Smuggling and tunnels, except as the issue pertains to the Rafah crossing itself, are also excluded from the AMA. ➢ Implementation mechanisms:
Perimeter security. The perimeter of the project will be secured by a six (6) foot chain link fence with two or three strands of barbed or razor wire above the chain link. Gating at security access/egress points will be of the same materials of construction as the perimeter fencing. Gates will be capable of being secured and locked.
Perimeter security. The Airport is surrounded by an eight-foot (8’) high chain link fence. Barbed wire is placed atop this fence. There are numerous locked gates that access the Airport perimeter. Airport Tenants that are situated on the immediate perimeter of the AOA must employ secured personnel doors.
Perimeter security. All entry to the n+2 facilities require individuals to be in the facility security system. Individuals will not be granted access to the facility unless prior authorization has been arranged.
Perimeter security. 8.25.1 Describe the controls in place, or you intend to have in place, to prevent and detect intruders at your outer security perimeter. This should cover:  Vehicle access and parking.  Exterior CCTV  Exterior patrols.  Shared reception security
Perimeter security. Access to warehouse cargo handling, shipping and receiving yard is adequately controlled to prevent unauthorized access.

Related to Perimeter security

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS. 18.2 A Tender Securing Declaration shall use the form included in Section IV, Tendering Forms. 18.3 If a Tender Security is specified pursuant to ITT 18.1, the Tender Security shall be a demand guarantee in any of the following forms at the Tenderer option: i) cash; ii) a bank guarantee; iii) a guarantee by an insurance company registered and licensed by the Insurance Regulatory Authority listed by the Authority; or

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.