Physical Security Perimeter Sample Clauses

Physical Security Perimeter. Supplier shall protect areas that contain information and information assets with security perimeters (barriers such as walls, card-controlled entry gates, or manned reception desks). These areas shall not be located in areas that are unattended or have unrestricted access by the public.
AutoNDA by SimpleDocs
Physical Security Perimeter. Security perimeters are used to protect areas that contain information and information processing
Physical Security Perimeter. 23.1. The Data Processor shall ensure that security perimeters are defined and used to protect areas that contain either sensitive or critical information and information processing facilities.
Physical Security Perimeter. Computers and IT assets that store or process sensitive and confidential business or ePHI information shall not be located in areas that are unattended or have unrestricted access by public or visitors to the facilities.

Related to Physical Security Perimeter

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.

  • Physical Security of Media DST shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is Schedule 10.2 p.3 stored by DST (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on DST encryption policies.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Physical and Environmental Security Controls that provide reasonable assurance that access to physical servers at the production data center or the facility housing Provider’s SFTP Server, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls include: a) Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; b) Camera surveillance systems at critical internal and external entry points to the data center; c) Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and d) Uninterruptible Power Supply (UPS) modules and backup generators that provide back-up power in the event of an electrical failure.

  • Inspection of Collateral Lender and Lender's designated representatives and agents shall have the right at all reasonable times to examine and inspect the Collateral wherever located.

  • Physical Exams The Employer agrees to provide without cost to employees, physical examinations and/or other appropriate tests when such tests are deemed necessary by management to determine whether the health of employees is being or has been adversely affected by exposure to potentially harmful physical agents, toxic materials, or infectious agents, or by attacks and assaults. The Employer agrees to provide to each affected employee who requests it a complete and accurate written report of any such medical examination or other appropriate tests related to occupational exposure. Additionally, written results of an industrial hygiene measurements or investigations related to an employee's occupational exposure will also be provided, upon request, to the employee or the employee's authorized representative. The Union and/or members of the applicable Health and Safety Committee will be provided copies of summary reports, but such reports will not contain personally identifying information.

  • Physical File Characteristics 6.2.1 The Optional Daily Usage File will be distributed to Comcast Phone via an agreed medium with CONNECT:Direct being the preferred transport method. The ODUF feed will be a variable block format (2476) with an LRECL of 2472. The data on the ODUF feed will be in a non-compacted EMI format (175 byte format plus modules). It will be created on a daily basis (Monday through Friday except holidays). Details such as dataset name and delivery schedule will be addressed during negotiations of the distribution medium. There will be a maximum of one dataset per workday per OCN. 6.2.2 Data circuits (private line or dial-up) will be required between BellSouth and Comcast Phone for the purpose of data transmission. Where a dedicated line is required, Comcast Phone will be responsible for ordering the circuit, overseeing its installation and coordinating the installation with BellSouth. Comcast Phone will also be responsible for any charges associated with this line. Equipment required on the BellSouth end to attach the line to the mainframe computer and to transmit successfully ongoing will be negotiated on an individual case basis. Where a dial-up facility is required, dial circuits will be installed in the BellSouth data center by BellSouth and the associated charges assessed to Comcast Phone. Additionally, all message toll charges associated with the use of the dial circuit by Comcast Phone will be the responsibility of Comcast Phone. Associated equipment on the BellSouth end, including a modem, will be negotiated on an individual case basis between the Parties. All equipment, including modems and software, that is required on Comcast Phone end for the purpose of data transmission will be the responsibility of Comcast Phone.

  • Regulation S Global Security to Restricted Global Security If a holder of a beneficial interest in a Regulation S Global Security deposited with or on behalf of DTC wishes at any time to transfer its interest in such Regulation S Global Security to a Person who wishes to take delivery thereof in the form of an interest in a Restricted Global Security, such holder may, subject to the rules and procedures DTC, exchange or cause the exchange of such interest for an equivalent beneficial interest in a Restricted Global Security. Upon receipt by the Trustee, as Certificate Registrar, of (I) instructions from DTC directing the Trustee, as Certificate Registrar, to cause to be credited a beneficial interest in a Restricted Global Security in an amount equal to the beneficial interest in such Regulation S Global Security to be exchanged but not less than the minimum denomination applicable to such holder’s Certificates held through a Restricted Global Security, to be exchanged, such instructions to contain information regarding the participant account with DTC to be credited with such increase, and (II) a certificate in the form of Exhibit N-2 hereto given by the holder of such beneficial interest and stating, among other things, that the Person transferring such interest in such Regulation S Global Security reasonably believes that the Person acquiring such interest in a Restricted Global Security is a QIB, is obtaining such beneficial interest in a transaction meeting the requirements of Rule 144A and in accordance with any applicable securities laws of any State of the United States or any other jurisdiction, then the Trustee, as Certificate Registrar, will reduce the principal amount of the Regulation S Global Security and increase the principal amount of the Restricted Global Security by the aggregate principal amount of the beneficial interest in the Regulation S Global Security to be transferred and the Trustee, as Certificate Registrar, shall instruct DTC, concurrently with such reduction, to credit or cause to be credited to the account of the Person specified in such instructions a beneficial interest in the Restricted Global Security equal to the reduction in the principal amount of the Regulation S Global Security.

  • Perfection of Uncertificated Securities Collateral Each Pledgor represents and warrants that subject to the filings and other actions described in Schedule 6 to the Perfection Certificate (to the extent required to be listed on the schedules to the Perfection Certificate as of the date this representation is made or deemed made) the Secured Party has a perfected first priority security interest (to the extent perfection may be achieved by filing such UCC financing statement) in all uncertificated Pledged Securities pledged by it hereunder that are in existence on the date hereof, subject only to Permitted Liens. Each Pledgor hereby agrees that if any of the Pledged Securities are at any time not evidenced by certificates of ownership, then each applicable Pledgor shall, to the extent permitted by applicable law, (i) cause or, in the case of an issuer that is not a Subsidiary of a Pledgor, use commercially reasonable efforts to cause, the issuer to execute and deliver to the Secured Party an acknowledgment of the pledge of such Pledged Securities substantially in the form of Exhibit 1 hereto or such other form that is reasonably satisfactory to the Secured Party, and (ii) if necessary or desirable to perfect a security interest in such Pledged Securities, cause or, in the case of an issuer that is not a Pledgor, use commercially reasonable efforts to cause, such pledge to be recorded on the equityholder register or the books of the issuer, execute any customary pledge forms or other documents necessary or appropriate to complete the pledge and give the Secured Party the right to transfer such Pledged Securities under the terms hereof.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!