Physical Access to Facilifies Sample Clauses

Physical Access to Facilifies. A. Cisco shall limit access to facilifies where systems that Process Personal Data are located to authorized individuals.
AutoNDA by SimpleDocs

Related to Physical Access to Facilifies

  • Physical Access PROVIDER agrees to allow the Office of Early Learning and COALITION staff or sub-contractors immediate access to the facilities and spaces used to offer the VPK Program during normal business hours.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Access to Facility 13.1 Each Party shall ensure that its facilities are secured at all times.

  • Access to Facilities Each of the Company and each of its Subsidiaries will permit any representatives designated by the Purchaser (or any successor of the Purchaser), upon reasonable notice and during normal business hours, at such person's expense and accompanied by a representative of the Company, to:

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • AUDITS; ACCESS TO RECORDS The CONTRACTOR shall make available to the COUNTY, its authorized agents, officers, or employees, for examination any and all ledgers, books of accounts, invoices, vouchers, cancelled checks, and other records or documents evidencing or relating to the expenditures and disbursements charged to the COUNTY, and shall furnish to the COUNTY, within sixty (60) days after examination, its authorized agents, officers or employees such other evidence or information as the COUNTY may require with regard to any such expenditure or disbursement charged by the CONTRACTOR. The CONTRACTOR shall maintain full and adequate records in accordance with County requirements to show the actual costs incurred by the CONTRACTOR in the performance of this Agreement. If such books and records are not kept and maintained by CONTRACTOR within the County of Mendocino, California, CONTRACTOR shall, upon request of the COUNTY, make such books and records available to the COUNTY for inspection at a location within County or CONTRACTOR shall pay to the COUNTY the reasonable, and necessary costs incurred by the COUNTY in inspecting CONTRACTOR’s books and records, including, but not limited to, travel, lodging and subsistence costs. CONTRACTOR shall provide such assistance as may be reasonably required in the course of such inspection. The COUNTY further reserves the right to examine and reexamine said books, records and data during the four (4) year period following termination of this Agreement or completion of all work hereunder, as evidenced in writing by the COUNTY, and the CONTRACTOR shall in no event dispose of, destroy, alter, or mutilate said books, records, accounts, and data in any manner whatsoever for four

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Access to Work District representatives shall at all times have access to the Work, wherever it is, in preparation or in progress. Contractor shall provide safe and proper facilities for such access.

Time is Money Join Law Insider Premium to draft better contracts faster.