Physical Access. PROVIDER agrees to allow the Office of Early Learning and COALITION staff or sub-contractors immediate access to the facilities and spaces used to offer the VPK Program during normal business hours.
Physical Access. All wireless devices shall be protected using appropriate physical controls to minimize the risk of theft, unauthorized use, or damage;
Physical Access. Contractor represents and warrants that it has established and during the Term it will at all times enforce:
(a) Physical protection mechanisms for all information assets and information technology to ensure such assets and technology are stored and protected in appropriate data centers;
(b) Appropriate facility entry controls limiting physical access to systems that store or process data;
(c) Processes to ensure access to facilities is monitored and is restricted on a “need to know” basis; and
(d) Controls to physically secure all Confidential Information and to properly destroy such information when it is no longer needed.
Physical Access. In order to perform the services requested, a representative from Office of Technology Services may need to physically access the client’s office or work space. The Office of Technology Services representative will make every effort to secure the client’s office or workspace and return it to its original condition. To report any incident regarding any unauthorized physical access, please complete the IT Security Form. Any information security incident should also be reported directly to leadership at your college, business unit or local department. Some of the types of information security incidents to be reported among others include: • Unauthorized use of information technology resources as stated in the Board’s C.1.9- Policy and C.1.9.1-Procedure • Unauthorized use of Alamo Colleges systems or data. • Unauthorized changes to computers or software. • Equipment theft or loss. • Compromised or unauthorized use of passwords. • Report SPAM/Phishing to Xxxxx@xxxxx.xxx.
Physical Access. Physical access, to include visitor access to facilities, must be restricted and all access periodically reviewed.
Physical Access. (i) physical protection mechanisms for all information assets and information technology to ensure such assets and technology are stored and appropriately protected;
(ii) appropriate facility and room entry controls to limit physical access to systems that store or Process Client Data;
(iii) processes to ensure access to facilities and rooms are monitored and is restricted on a “need to know” basis; and
(iv) controls to physically secure all Client Data and to securely destroy such information when it is no longer needed in accordance with this Exhibit and the Agreement.
Physical Access. The Client is to ensure that the Supplier Personnel and any Third Party Personnel nominated by the Supplier are given reasonable authorised access to premises and equipment in order that the Services may be delivered and maintained in accordance with the terms of this Agreement.
Physical Access. Entrances/Exits
Physical Access. INAP has installed and will maintain security systems to control access to the Facility and Shared Common Space (as defined herein). INAP shall provide Customer with key cards or other such technology to access the Facility, Shared Common Space, multi-tenant data halls, and the Data Center Suite, as appropriate. All such access shall be recorded and maintained by INAP. Customer will have access to the private Data Center Suite, 24-hours a day, 7-days a week, unless otherwise specified in an Ordering Document. Only Customer shall have access to Customer’s Data Center Suite, except, in the case of INAP, for maintenance, to ensure security, with prior express consent (including by electronic mail), upon standing consent (e.g. for Remote Hands Services), and in the case of emergency. Customer is responsible for cost to replace lost access cards.
Physical Access. Xxxxxx Services use IaaS vendors that validate physical security of relevant facilities using the following access controls: • 24x7 Security guards; • Internal and external video cameras; • Formal access and visitor procedures; • Entrance security controls, such as badge readers, biometric identification mechanisms, and/or physical locks; • Alarmed emergency exit points; • Fire detection alarms and protection equipment; and • Redundant and emergency power sources.