Physical and Environment Security Sample Clauses

Physical and Environment Security. 7.1. Physical access to Agent’s on-site data centers will be strictly controlled by proximity card access groups that are limited to the operations staff who require access to perform their contracted roles. 7.2. Agent’s on-site data centers will have strict controls to protect against environmental threats such as over-heating, flooding, fire, dust and chemical pollutants. 7.3. Agent’s on-site data centers will have dual power feeds. monitored Uninterruptible Power Supply (UPS) systems. back-up generators with on-site fuel store. redundant air conditioning systems, and a dual-path telecommunications infrastructure for critical communications systems. 7.4. Confidential Information will be securely erased using industry-standard data deletion utilities. physically destroyed. or returned to Clients. subject to the terms and conditions of the Agreement.
AutoNDA by SimpleDocs
Physical and Environment Security. Entrust facilities hosting technology information assets are equipped with appropriate controls to restrict physical access to the facility. Physical entry controls include a means to identify personnel and visitors, and ensure the individual is authorized to access the secured area prior to entry. All entry to secured areas are logged and logs are reviewed periodically. Personnel are informed of, and subject to, the guidelines established for working within secured areas. Access points such as delivery or loading areas, and other points where unauthorized persons may enter the facility, are controlled to restrict further entry, and, to the extent it is practical, isolated from information processing areas. Physical security measures include the capability to monitor company facilities to detect unauthorized or unlawful use. Entrust has a physical security plan that incorporates a defined procedure to report suspicious activity, identified security weaknesses, or potential security events, as well as an escalation procedure to communicate events to local law enforcement as appropriate. Facility staff and visitors are informed regarding these physical security procedures and their responsibility to report security events. Information to be transferred shall at all times be properly secured, in accordance with its classification, regardless of the media employed to carry the information or the transmission mechanism. All information to be transferred shall be subject to inspection for malicious software code and other potential hazards to confidentiality, integrity or availability. When the use of encryption is required for safekeeping, such use shall be subject to all applicable security controls as well as legal or regulatory requirements. Information to be transferred shall be subject to established retention and disposal requirements. Information transfer facilities shall comply with all applicable laws and regulations. Information and software shall not be transferred with external parties until all relevant contractual and security requirements are satisfied, including formal written agreements where required.
Physical and Environment Security. Entrust Datacard facilities hosting technology information assets are equipped with appropriate controls to restrict physical access to the facility. Physical entry controls include a means to identify personnel and visitors, and ensure the individual is authorized to access the secured area prior to entry. All entry to secured areas are logged and logs reviewed periodically. Personnel are informed of, and subject to, the guidelines established for working within secured areas. Access points such as delivery or loading areas, and other points where unauthorized persons may enter the facility, are controlled to restrict further entry, and, to the extent it is practical, isolated from information processing areas. Physical security measures include the capability to monitor company facilities to detect unauthorized or unlawful use. Entrust Datacard has a physical security plan that incorporates a defined procedure to report suspicious activity, identified security weaknesses, or potential security events, as well as an escalation procedure to communicate events to local law enforcement as appropriate. Facility staff and visitors are informed regarding these physical security procedures and their responsibility to report security events.
Physical and Environment Security a. Medallia products and customer data are hosted at providers who have demonstrated compliance with one or more of the following standards (or a reasonable equivalent): International Organization for Standardization (“ISO”) 27001 and/or American Institute of Certified Public Accountants (“AICPA”) Service Organization Controls (“SOC”) Reports for Services Organizations. These providers provide Internet connectivity, physical security, power, and environmental systems and services for the Medallia cloud platform used for the Products. b. An N-tiered architecture is used to support presentation, application, processing, and data services. For enhanced security in the Medallia cloud platform, technologies such as firewalls, intrusion detection and prevention, and vulnerability management are used.
Physical and Environment Security. 7.1 Leading Resolutions shall ensure that physical controls are in place to restrict access to authorised individuals surrounding its premises and data centre environments that support the Supplier Systems.
Physical and Environment Security x. Xxxx products and customer data are hosted at providers who have demonstrated compliance with one or more of the following standards (or a reasonable equivalent): International Organization for Standardization (“ISO”) 27001 and/or American Institute of Certified Public Accountants (“AICPA”) Service Organization Controls (“SOC”) Reports for Services Organizations. These providers provide Internet connectivity, physical security, power, and environmental systems and services for the Voci cloud platform used for the Products. b. An N-tiered architecture is used to support presentation, application, processing, and data services. For enhanced security in the Voci cloud platform, technologies such as firewalls, intrusion detection and prevention, and vulnerability management are used.

Related to Physical and Environment Security

  • Physical and Environmental Security Controls that provide reasonable assurance that access to physical servers at the production data center or the facility housing Provider’s SFTP Server, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls include: a) Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; b) Camera surveillance systems at critical internal and external entry points to the data center; c) Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and d) Uninterruptible Power Supply (UPS) modules and backup generators that provide back-up power in the event of an electrical failure.

  • Protection of the Environment If the Contractor encounters circumstances such as weather conditions or site factors where the Contractor knows or should reasonably know that proceeding with the Work may, directly or indirectly, cause Environmental Damage, the Contractor shall:

  • Damage to Government Property A. In the event of loss, destruction, or damage to any System Agency or State of Texas owned, leased, or occupied property or equipment by Performing Agency or Performing Agency’s employees, agents, Subcontractors, and suppliers, Performing Agency shall be liable to System Agency and the State of Texas for the full cost of repair, reconstruction, or replacement of the lost, destroyed, or damaged property. B. Performing Agency shall notify System Agency of the loss, destruction, or damage of equipment or property within one (1) business day. Performing Agency shall reimburse System Agency and the State of Texas for such property damage within 10 calendar days after Performing Agency’s receipt of System Agency’s notice of amount due.

  • Smoke Free Environment The Lessor shall make all parts of the leased premise smoke-free. "

  • Indemnity for U.S. Government Obligations The Issuer shall pay and shall indemnify the Trustee against any tax, fee or other charge imposed on or assessed against deposited U.S. Government Obligations or the principal and interest received on such U.S. Government Obligations.

  • NO GOVERNMENT OBLIGATION TO THIRD PARTIES (1) The Department and Contractor acknowledge and agree that, notwithstanding any concurrence by the Federal Government in or approval of the solicitation or award of the underlying contract, absent the express written consent by the Federal Government, the Federal Government is not a party to this contract and shall not be subject to any obligations or liabilities to the Department, Contractor, or any other party (whether or not a party to that contract) pertaining to any matter resulting from the underlying contract. (2) The Contractor agrees to include the above clause in each subcontract financed in whole or in part with Federal assistance provided by FTA. It is further agreed that the clause shall not be modified, except to identify the subcontractor who will be subject to its provisions.

  • Government Securities 16 Guarantee................................................... 16 Guarantor................................................... 17 Holder...................................................... 17 Incur....................................................... 17

  • Environment, Health, and Safety 23.4.1. The Supplier and its staff (and/or any sub-supplier and/or subcontractor) shall comply with the laws and regulations in force related to protection of the environment, the health and safety instructions applicable to the Goods and Services performed pursuant to the Contract and especially, if appropriate, to the Goodsand Services performedon any Site by a third company. 23.4.2. The Supplier and its staff (and/or any sub-supplier and/or subcontractor) shall also comply with the internal rules at the Purchaser and/or Customer’s site(s) where it may have to work for the purpose of performance of the Contract including EHS rules and requirements, as applicable. In case of conflict between different EHS requirements, the most stringent standard shall apply. 23.4.3. In the eventof presence or activity of the Supplier (and/or any sub-supplier and/or subcontractor) on any Purchaser and/or Customer Site, the Supplier, and any sub-supplier and/or subcontractor, as the case may be, the Supplier shall ensure appropriate personnel training and qualification and submit any proof relating to such qualification upon Purchaser’s request. Additionally, the Supplier shall consider any hazards associated with Site conditions, installations and/or machinery nearby. More generally, Supplier shall, at all times, comply with the Purchaser and/or Customer internal rules, including EHS rules and requirements, as applicable. In case of conflict between different EHS requirements, the most stringent standard shall apply. 23.4.4. If the Supplier’s staff (and/or any sub-supplier and/or subcontractor) fail to comply with any of the laws, regulation and or internal rules mentioned under this Article 23.4, the Purchaser is entitled to apply to the Supplier, penalties which in no case shall be considered asliquidateddamagesandwithoutanypriorofficialnotification, correspondingtothirtynine thousand Renminbi (39 000 CNY) per event, without prejudice (i) to the possibility for the Purchaser to ask for the replacement of its staff member or the staff member of its sub- supplier and/or subcontractor, responsible of the breach, and/or (ii) to the possibility for the Purchaser to terminate the Contract for Supplier’s default or to ask for the Supplier to terminate its sub-suppliers and/or subcontractors contracts, and/or (iii) for the Supplier to indemnify and hold harmless the Purchaser, its affiliates, officers, employees and agents 23.4.5. In application of applicable employment laws, the Purchaser must take all appropriate measures to ensure the safety and security as well as the physical and mental health of all employees present on its premises. 23.4.6. The Supplier shall be fully responsible and commits to take all necessary measures ensuring the safety and security as well as the physical and mental health of all its employees who could have to travel in whatever country for the proper execution by the supplier of its obligations as set out under the Contract.

  • Working Environment The Parties agree that a safe and clean working environment is essential in order to carry out work assignments in a satisfactory manner. It will be the Employer's responsibility to ensure that all working areas and Employer-owned vehicles are maintained in a safe and clean condition.

  • Deposited Money and U.S. Government Securities to Be Held in Trust; Other Miscellaneous Provisions Subject to Section 8.06, all money and U.S. Government Securities (including the proceeds thereof) deposited with the Trustee (or other qualifying trustee, collectively for purposes of this Section 8.05, the “Trustee”) pursuant to Section 8.04 in respect of the outstanding Securities shall be held in trust and applied by the Trustee, in accordance with the provisions of such Securities and this Indenture, to the payment, either directly or through any Paying Agent (including the Company or a Subsidiary Guarantor, if any, acting as Paying Agent) as the Trustee may determine, to the Holders of such Securities of all sums due and to become due thereon in respect of principal, premium, if any, and interest, but such money need not be segregated from other funds except to the extent required by law. The Company shall pay and indemnify the Trustee against any tax, fee or other charge imposed on or assessed against the cash or U.S. Government Securities deposited pursuant to Section 8.04 or the principal and interest received in respect thereof other than any such tax, fee or other charge which by law is for the account of the Holders of the outstanding Securities. Anything in this Article Eight to the contrary notwithstanding, the Trustee shall deliver or pay to the Company from time to time upon the Company’s request any money or U.S. Government Securities held by it as provided in Section 8.04 which, in the opinion of a nationally recognized firm of independent public accountants expressed in a written certification thereof delivered to the Trustee (which may be the opinion delivered under Section 8.04(a)), are in excess of the amount thereof which would then be required to be deposited to effect an equivalent Legal Defeasance or Covenant Defeasance.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!