Physical access policy Sample Clauses

Physical access policy. The requirements listed with regard to workstation security apply in equal measure to building protection. Particularly in security-critical areas, external persons must be supervised constantly. Depending of protection requirements, further restrictive measures are to be implemented.
AutoNDA by SimpleDocs
Physical access policy. 4.1. Physical access to the JEDIX Platform site is restricted to staff and third parties authorized in writing by JEDIX. 4.2. Members’ cable termination to the JEDIX Platform may only be performed by staff or third parties authorized in writing by JEDIX.

Related to Physical access policy

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Tenant Access Landlord, in Landlord’s reasonable discretion and upon receipt of a written request from Tenant, may grant Tenant a license to have access to the Premises prior to the Completion Date to allow Tenant to do other work required by Tenant to make the Premises ready for Tenant’s use and (the “Tenant’s Pre-Occupancy Work”). It shall be a condition to the grant by Landlord and continued effectiveness of such license that: (a) Tenant shall give to Landlord a written request to have such access not less than five (5) business days prior to the date on which such proposed access will commence (the “Access Notice”). The Access Notice shall contain or be accompanied by each of the following items, all in form and substance reasonably acceptable to Landlord: (i) a detailed description of and schedule for Tenant’s Pre-Occupancy Work; (ii) the names and addresses of all contractors, subcontractors and material suppliers and all other representatives of Tenant who or which will be entering the Premises on behalf of Tenant to perform Tenant’s Pre-Occupancy Work or will be supplying materials for such work, and the approximate number of individuals, itemized by trade, who will be present in the Premises; (iii) copies of all contracts, subcontracts, material purchase orders, plans and specifications pertaining to Tenant’s Pre-Occupancy Work; (iv) copies of all licenses and permits required in connection with the performance of Tenant’s Pre-Occupancy Work; (v) certificates of insurance (in amounts satisfactory to Landlord and with the parties identified in, or required by, the Lease named as additional insureds) and instruments of indemnification against all claims, costs, expenses, penalties, fines, and damages which may arise in connection with Tenant’s Pre-Occupancy Work; and (vi) assurances of the ability of Tenant to pay for all of Tenant’s Pre-Occupancy Work and/or a letter of credit or other security deemed appropriate by Landlord securing Tenant’s lien-free completion of Tenant’s Pre-Occupancy Work. (b) Such pre-term access by Tenant and Tenant’s employees, agents, contractors, consultants, workmen, mechanics, suppliers and invitees shall be subject to scheduling by Landlord. (c) Tenant’s employees, agents, contractors, consultants, workmen, mechanics, suppliers and invitees shall fully cooperate, work in harmony and not, in any manner, interfere with Landlord or Landlord’s agents or representatives in performing the Work and any additional work pursuant to approved Change Orders, Landlord’s work in other areas of the Building or the Park, or the general operation of the Building. If at any time any such person representing Tenant shall not be cooperative or shall otherwise cause or threaten to cause any such disharmony or interference, including, without limitation, labor disharmony, and Tenant fails to immediately institute and maintain corrective actions as directed by Landlord, then Landlord may revoke such license upon twenty-four (24) hours’ prior written notice to Tenant. (d) Any such entry into and occupancy of the Premises or any portion thereof by Tenant or any person or entity working for or on behalf of Tenant shall be deemed to be subject to all of the terms, covenants, conditions and provisions of the Lease, excluding only the covenant to pay Rent. Landlord shall not be liable for any injury, loss or damage which may occur to any of Tenant’s Pre-Occupancy Work made in or about the Premises or to any property placed therein prior to the commencement of the term of the Lease, the same being at Tenant’s sole risk and liability. Tenant shall be liable to Landlord for any damage to any portion of the Premises, the Work or the additional work related to any approved Change Orders caused by Tenant or any of Tenant’s employees, agents, contractors, consultants, workmen, mechanics, suppliers and invitees. In the event that the performance of Tenant’s Pre-Occupancy Work causes extra costs to be incurred by Landlord or requires the use of other Building services, Tenant shall promptly reimburse Landlord for such extra costs and/or shall pay Landlord for such other Building services at Landlord’s standard rates then in effect.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to: (a) Use such programs and databases (i) solely on the Fund’s computers or on computers of Federated Services Company or its affiliates (collectively, “Fund Computers”), or (ii) solely from equipment at the location agreed to between the Fund and the Transfer Agent and (iii) solely in accordance with the Transfer Agent’s applicable user documentation; (b) Refrain from copying or duplicating in any way (other than in the normal course of performing processing on the Fund Computers), the Transfer Agent Proprietary Information; (c) Refrain from obtaining unauthorized access to any portion of the Transfer Agent Proprietary Information, and if such access is inadvertently obtained, to inform Transfer Agent in a timely manner of such fact and dispose of such information in accordance with the Transfer Agent’s instructions; (d) Refrain from causing or allowing information transmitted from the Transfer Agent’s computer to the Fund’s terminal to be retransmitted to any other computer terminal or other device except as expressly permitted by the Transfer Agent (such permission not to be unreasonably withheld); (e) Allow the Fund to have access only to those authorized transactions as agreed to between the Fund and the Transfer Agent; and (f) Honor all reasonable written requests made by the Transfer Agent to protect at the Transfer Agent’s expense the rights of the Transfer Agent in the Transfer Agent Proprietary Information at common law, under federal copyright law and under other federal or state law. 6.2 The Fund shall take reasonable efforts to advise its employees of their obligations pursuant to this Section 6. The obligations of this Section shall survive any earlier termination of this Agreement. 6.3 If the Fund notifies the Transfer Agent that any of the Data Access Services do not operate in material compliance with the most recently issued user documentation for such services, the Transfer Agent shall use its best efforts in a timely manner to correct such failure. Organizations from which the Transfer Agent may obtain certain data included in the Data Access Services are solely responsible for the contents of such data and the Fund agrees to make no claim against the Transfer Agent arising out of the contents of such third-party data, including, but not limited to, the accuracy thereof; provided, however, that the Fund shall be entitled to insist that the Transfer Agent, and the Transfer Agent for the benefit of the Fund shall, enforce any and all rights under applicable contracts for the Data Access Services. SUBJECT TO THE FOREGOING OBLIGATIONS OF THE TRANSFER AGENT, DATA ACCESS SERVICES AND ALL COMPUTER PROGRAMS AND SOFTWARE SPECIFICATIONS USED IN CONNECTION THEREWITH ARE PROVIDED ON AN AS IS, AS AVAILABLE BASIS. EXCEPT AS OTHERWISE PROVIDED HEREIN TO THE CONTRARY, THE TRANSFER AGENT EXPRESSLY DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 6.4 If the transactions available to the Fund include the ability to originate Proper Instructions through electronic instructions to the Transfer Agent in order to: (i) effect the transfer or movement of cash or Shares; or (ii) transmit Shareholder information or other information, then in such event the Transfer Agent shall be entitled to rely on the validity and authenticity of such Proper Instructions without undertaking any further inquiry as long as such Proper Instruction is undertaken in conformity with applicable security procedures.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Post-Closing Access to Information For a period of seven (7) years from the Closing Date, except as prohibited by applicable Law, Seller and Buyer shall, subject to compliance by the other with the provisions of Section 5.12 and the Transition Services Agreement, afford to each other and to each other’s Representatives reasonable access and duplicating rights (with copying costs to be borne by the requesting party) during normal business hours to all books and records, documents and other information (collectively, “Information”) within the knowledge, possession or control of the other party or its Affiliates solely to the extent relating to (a) in the case of requests by Buyer, the FH Business, Transferred FH Companies (and their Closing Subsidiaries), FH Assets, the Acquired FH Assets, Assumed Liabilities or Transferred Employees and (b) in the case of requests by Seller, the Excluded Businesses, the Excluded Assets or the Retained Liabilities, insofar in each case as such access is reasonably required by Seller or Buyer or any of their Subsidiaries or Affiliates for legitimate business reasons and does not violate any applicable Law or any confidentiality obligations applicable to Seller or Buyer or any of their Subsidiaries or Affiliates, as the case may be (and shall use reasonable efforts to cause persons or firms possessing relevant Information to give similar access) and, to the extent practicable, such Information is identified by the requesting party with reasonable specificity; provided, however, that no party shall be required to disclose any Information if (i) it believes in good faith that doing so presents a significant risk, based on advice of counsel (which can be inside counsel) of resulting in a loss of the ability to successfully assert a claim of Privilege or (ii) Seller or any of its Subsidiaries, on the one hand, and Buyer or any of its Subsidiaries, on the other hand, are adverse parties in a litigation (other than a litigation with respect to a claim for indemnification under this Agreement) and such information is reasonably pertinent thereto; provided, further, that, in the case of clause (i) above, the parties hereto shall reasonably cooperate in seeking to find a way to allow disclosure of such information without resulting in a loss of the ability to successfully assert a claim of Privilege; provided, further, that Seller and its Affiliates shall not be required to provide Buyer or its Representatives with any information related to the Sale Process or Seller’s or its Representatives’ evaluation thereof, including projections, financial or other information related thereto other than projections, financial or other information prepared in the ordinary course of the FH Business without being primarily prepared for the Sale Process. Without limiting the generality of the foregoing, Information may be requested under this Section 5.9 for audit and accounting purposes and in connection with Actions, as well as for purposes of fulfilling disclosure and reporting obligations.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Access to and Maintenance of Auction Records The Auction Agent shall afford to the Company, its agents, independent public accountants and counsel, access at reasonable times during normal business hours to review and make extracts or copies (at the Company's sole cost and expense) of all books, records, documents and other information concerning the conduct and results of Auctions, provided that any such agent, accountant or counsel shall furnish the Auction Agent with a letter from the Company requesting that the Auction Agent afford such person access. The Auction Agent shall maintain records relating to any Auction for a period of two years after such Auction (unless requested by the Company to maintain such records for such longer period not in excess of four years, then for such longer period), and such records, in reasonable detail, shall accurately and fairly reflect the actions taken by the Auction Agent hereunder. The Company agrees to keep confidential any information regarding the customers of any Broker-Dealer received from the Auction Agent in connection with this Agreement or any Auction, and shall not disclose such information or permit the disclosure of such information without the prior written consent of the applicable Broker- Dealer to anyone except such agent, accountant or counsel engaged to audit or review the results of Auctions as permitted by this Section 2.7, provided that the Company reserves the right to disclose any such information if it is advised by its counsel that its failure to do so would (i) be unlawful or (ii) expose it to liability, unless the Broker-Dealer shall have offered indemnification satisfactory to the Company. Any such agent, accountant or counsel, before having access to such information, shall agree to keep such information confidential and not to disclose such information or permit disclosure of such information without the prior written consent of the applicable Broker-Dealer, provided that such agent, accountant or counsel may reserve the right to disclose any such information if it is advised by its counsel that its failure to do so would (i) be unlawful or (ii) expose it to liability, unless the Broker-Dealer shall have offered indemnification satisfactory to such agent, accountant or counsel.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!