Physical Security and Entry Control Sample Clauses

Physical Security and Entry Control. 4.1 Acoustic will verify the maintenance of appropriate physical-entry controls, such as barriers, card- controlled entry points, surveillance cameras, and manned reception desks, to protect against unauthorized entry into facilities used to host the SaaS Product ("Data Centers"). Auxiliary entry points into Data Centers, such as delivery areas and loading docks, will be controlled and isolated from computing resources.
AutoNDA by SimpleDocs
Physical Security and Entry Control a. Reseller will maintain appropriate physical entry controls and surveillance mechanisms to protect against unauthorized entry into Reseller facilities used to host or otherwise provide the Services.
Physical Security and Entry Control a. Supplier will maintain appropriate physical entry controls, such as barriers, card-controlled entry points, surveillance cameras, and manned reception desks, to protect against unauthorized entry into Supplier facilities. Supplier will also control auxiliary entry points into such facilities, such as delivery areas and loading docks, and isolate those entry points from computing resources.
Physical Security and Entry Control a. IBM will maintain appropriate physical entry controls, such as barriers, card -controlled entry points, surveillance cameras, and manned reception desks, to protect against unauthorized entry into IBM managed facilities (data centers) used to host the IBM Services. Auxiliary entry points into such data centers, such as delivery areas and loading docks, will be controlled and isolated from computing resources.
Physical Security and Entry Control a. Cellulant will maintain appropriate physical entry controls, such as barriers, card-controlled entry points, surveillance cameras, and manned reception desks, to protect against unauthorized entry into Cellulant facilities. Cellulant will also control auxiliary entry points into such facilities, such as delivery areas and loading docks, and isolate those entry points from computing resources.
Physical Security and Entry Control. (a) Pindrop will maintain reasonable physical entry controls, such as barriers, card- controlled entry points, surveillance cameras, and manned reception desks, designed to protect against unauthorized entry into Pindrop-managed facilities (i.e., its headquarter facility) used to provide the Pindrop-Controlled Systems. Auxiliary entry points into such facilities, such as delivery areas and loading docks, will be controlled and isolated from computing resources.

Related to Physical Security and Entry Control

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Physical Safeguards USAC and the Department agree to maintain all automated matching records in a secured computer environment that includes the use of authorized access codes to restrict access. Those records will be maintained under conditions that restrict access to persons who need them for official duties related to the matching process. The user’s supervisor will ensure that USAC or the Department are notified when a user has departed or duties have changed so the user no longer needs access to the system, to ensure timely deletion of the user’s account and password.

Time is Money Join Law Insider Premium to draft better contracts faster.