Physical Site Security Sample Clauses

Physical Site Security and Device hardening • Electronic access card reading system • Management of keys/documentation of key holders • Palisade fencing • Solid reinforced concrete exterior to building with no windows. • 24x7x365 staffed security guardsSecurity service, front desk with required sign in for all visitors • Burglar alarm system • Internal and external infrared pan, tilt, zoom CCTV Monitored building management system • Biometric scanners • Man traps • Remove unused software and services from devices used to Process Personal Information. • Default passwords that are provided by hardware and software producers shall not be used. • Mandate and ensure the use of system enforced strong passwords in accordance with leading industry practices on all systems hosting, storing, processing, or that have or control access to CARNIVAL’s information and • Passwords and access credentials are kept confidential and not shared among personnel.
AutoNDA by SimpleDocs
Physical Site Security. The Operator shall maintain and enforce at the Operator's Service Locations reasonable physical safety and security procedures. The Operator shall be responsible for any failures of the Operator or its agents to comply with reasonable Operator physical safety and security procedures then in effect at the applicable Operator Service Locations or reasonable physical safety and security procedures then in effect at the applicable Client Service Locations, to the extent that such non-compliance causes damages to the Client.
Physical Site Security. AWS data centers that host the Services are strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions. Each data center has redundant electrical power systems that are available twenty-four (24) hours a day, seven (7) days a week. Uninterruptible power supplies and on-site generators are available to provide back-up power in the event of an electrical failure. More details about the physical security of AWS data centers used by Coinbase for the Services, are available at xxxxx://xxx.xxxxxx.xxx/whitepapers/overview-of-security-processes/. In addition, Coinbase office spaces have a physical security program that manages visitors, building entrances, CCTVs (closed circuit television), and overall office security. Physical security audits are performed annually.

Related to Physical Site Security

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Physical Security of Media Transfer Agent shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is stored by Transfer Agent (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on Transfer Agent encryption policies.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

Time is Money Join Law Insider Premium to draft better contracts faster.