We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Procedural Security Sample Clauses

Procedural SecuritySeller will maintain, document, implement and communicate to all employees the following security procedures i. Procedures for the issuance, removal and changing of access devices. ii. Procedures to identify and challenge unauthorized or unidentified persons iii. Procedures to remove identification, facility, and system access for terminated employees. iv. Procedures for IT security and standards. v. Procedures governing the use, maintenance and protection of security technology. vi. Procedures to verify application information for potential employees. vii. Procedures for employees to report security incidents and/or suspicious behavior. viii. Procedures for the inspection of ocean containers or truck trailers, including policies for agricultural and security inspections, prior to stuffing. ix. Procedures to secure cargo staging areas including protection from unauthorized access and prevention of pest contamination as well as inspection for visible pest contamination on a regular basis x. Procedures to control, manage and record the issuance and use of high security bolt seals for ocean containers and truck trailers. Such procedures must stipulate how seals are to be controlled and affixed to loaded containers and shall include procedures for recognizing and reporting compromised seals or containers to US Customs or the appropriate foreign authority and Boeing at xxxxxxxxxxxxxxxxxxx@xxxxxx.xxx. xi. Procedures to identify any party on denied party lists maintained by the Department of Commerce/Bureau of Industry and Security (BIS), the Department of State/Directorate of Defense Trade Controls (DDTC), and the Department of Treasury/Office of Foreign Assets Control (OFAC). xii. Procedures for ensuring that information transmitted/received to/from service providers, subcontractors and agents, is reported accurately and timely xiii. Procedures for ensuring that all information used in the preparation of merchandise/cargo for export (EEI or other required export form), is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information
Procedural Security. Vendor’s security policy promotes a secure procedural environment. This environment includes the inability to use removable write data external to the main facility and printing from the datacenters is prohibited.
Procedural Security. Measures for the handling of incoming and outgoing goods should include the protection against the introduction, exchange, or loss of any legal or illegal material. Security controls should include: properly marked, weighed, counted and documented products, procedures for affixing, replacing, recording, tracking and verifying seals on containers, trailers and railcars, procedures for detecting and reporting shortages and overages, procedures for tracking the timely movement of incoming and outgoing goods, proper storage of empty and full containers/trailers/railcars to prevent unauthorized access, and procedures to notify Customs and Border Protection in cases where anomalies or illegal activities are detected or suspected by the company. Personnel Security: Companies should conduct employment screening and interviewing of prospective employees to include periodic background checks and application verifications in accordance with applicable statutes and regulations.
Procedural Security. Procedures should be in place to protect against unmanifested material being introduced into the supply chain.
Procedural Security. Procedural Security measures regulate incoming and outgoing goods and are designed to prevent the introduction of unmanifested materials into the supply chain, or the loss or exchange of ISUZU merchandise. 1.1 Each factory should have a designated employee supervising the introduction and removal of cargo. 1.2 All merchandise must be properly marked, weighed, counted, and documented. 1.3 Procedures must be in place to govern the detection and recording of shortages and overages. 1.4 Containers, trailers, and/or railcars left at the facility overnight must be secured. Containers that are full of cargo must be locked and sealed with industry- approved seals and corresponding seal numbers must be recorded. The seals must be uniquely numbered and require destruction to be removed. 1.5 The factory should have a procedure for inspecting and verifying seals. Discrepancies must immediately be reported to management and/or security personnel. 1.6 All containers or trailers entering or leaving the facility must be recorded, along with the name of the driver who took custody of the merchandise. 1.7 All security procedures must be documented with formal self-assessments (see attached) completed every year. Copies of the self-assessment must be forwarded to ISUZU’s Purchasing Manager. 1.8 ISUZU conducts assessments on a periodic basis. ISUZU or its agents shall have the right to conduct assessments at all reasonable times upon prior notice to supplier.
Procedural Security. Procedures should be in place to protect against unmanifested material being introduced onto the facility. Security controls should include: · Having designated, trained personnel to supervise the introduction/removal of cargo. · Seven-point inspection of each container will be performed before loading the container. The carrier will inspect the container when picking up to deliver to the SCJ facility or co-packer. Container seals will be handled per the seal handling procedures (as published separately). Containers will be inspected by the carrier when dropping the trailers. The warehouse personnel unloading the containers will inspect the container when unloading and notify of any problems or issues. · Properly marked, weighed, counted, and documented cargo/cargo equipment verified against manifest documents. · Procedures for verifying seals on containers, trailers, and railcars. · Procedures for detecting and reporting shortages and overages. · Procedures to notify Customs and other law enforcement agencies in cases where anomalies or illegal activities are detected or suspected by the company. · Deliveries (including mail) -- periodic screening of packages shall be conducted. Suspected breaches of the delivery or suspicious packages should be reported immediately to security for resolution. Once notified, Security shall notify U.S. Customs and Border Protection (CBP) or the appropriate agency. At each location, the Security Staff will have the following records, logs, or information readily available to all shift personnel: · Corporate emergency contact list · Security Supervisor after-hours contact information · Facility emergency contact list · Key list (keys and proximity cards issued to the guard force) · Property Pass Authorization and Exemption List · Property Pass file system (file to maintain copies of Property Passes) · Pass Down log (log to pass important information from one shift to another) · Visitor Registration Log · Employee Temporary and Contractor Employee Badge Log
Procedural SecuritySeller will maintain, document, implement and communicate to all employees the following security procedures i. Procedures for the issuance, removal and changing of access devices. ii. Procedures to identify and challenge unauthorized or unidentified persons iii. Procedures to remove identification, facility, and system access for terminated employees. iv. Procedures for IT security and standards. v. Procedures to verify application information for potential employees. vi. Procedures for employees to report security incidents and/or suspicious behavior. vii. Procedures for the inspection of ocean containers or truck trailers prior to stuffing. viii. Procedures to control, manage and record the issuance and use of high security bolt seals for ocean containers and truck trailers. Such procedures must stipulate how seals are to be controlled and affixed to loaded containers and shall include procedures for recognizing and reporting compromised seals or containers to US Customs or the appropriate foreign authority and Boeing at xxxxxxxxxxxxxxxxxxx@xxxxxx.xxx. ix. Procedures to identify any party on denied party lists maintained by the Department of Commerce/Bureau of Industry and Security (BIS), the Department of State/Directorate of Defense Trade Controls (DDTC), and the Department of Treasury/Office of Foreign Assets Control (OFAC). x. Procedures for ensuring that information transmitted/received to/from service providers, subcontractors and agents, is reported accurately and timely xi. Procedures for ensuring that all information used in the preparation of merchandise/cargo for export (EEI or other required export form), is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information
Procedural Security 

Related to Procedural Security

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.

  • National Security 28.01 The Canadian government, either directly or through its agencies, may instruct the Employer with respect to the security of information and materials and the personnel permitted to do certain work. The Union recognizes that the Employer is obliged to meet such instructions and that for such reason the Employer may refuse certain Employees access to the work or may transfer Employees covered by such instructions.

  • Collateral Security (a) The Obligations shall be secured by (a) a perfected first-priority security interest (subject to Permitted Liens entitled to priority under Applicable Law) in all Collateral, whether now owned or hereafter acquired, pursuant to the terms of the Security Agreement to which each Borrower is a party to the extent perfected by the filing of UCC financing statements; (b) a pledge of 100% of the capital stock or other Equity Interests of such Borrowers (other than the Parent) and of the Non-Borrower Subsidiaries (other than the Foreign Subsidiaries) to the Administrative Agent on behalf of the Secured Parties pursuant to the Pledge Agreement; and (c) a pledge of the capital stock or other Equity Interests of each Foreign Subsidiary (provided that not more than 65% of the total voting power of all outstanding capital stock or other Equity Interest of any such first-tier Foreign Subsidiary of a Borrower shall be required to be so pledged and no Equity Interests of any non-first-tier Foreign Subsidiary shall be provided to be so pledged); provided that the Borrowers hereby agree, upon the request of the Administrative Agent and the Required Lenders, to deliver, as promptly as practicable, but in any event within ninety (90) days after request therefor, or such other later time, if any, to which the Administrative Agent may agree, (i) certificates of titles for all or substantially all vehicles, trucks, trailers, tractors, automobiles and any other equipment covered by certificates of title owned by a Borrower (collectively, “Motor Vehicles”) with the Administrative Agent listed as lienholder therein (subject to a limited power of attorney in favor of the Parent to dispose of titled equipment) and, if required by the Administrative Agent, the Borrowers shall retain Corporation Service Company (or other similar company satisfactory to the Administrative Agent) pursuant to agreements reasonably satisfactory to the Administrative Agent pursuant to which Corporation Service Company (or such other company) will agree to act as agent for the Secured Parties with respect to the perfection of security interests in the Motor Vehicles; and (ii) mortgages with respect to Real Property and to take such other steps and make such other deliveries as may be reasonably requested by the Administrative Agent (including, without limitation, the delivery of legal opinions, Consulting Engineer’s reports, surveys, title insurance, environmental assessment reports, flood hazard certifications, evidence of flood insurance, if required, and a certification of the name and address of each real estate recording office where a mortgage on the real estate on which any Collateral consisting of fixtures may be located would be recorded) so as to provide the Administrative Agent, for the benefit of the Secured Parties, a perfected first-priority security interest in such assets, provided that to the extent that any lease of (or operating/management agreement with respect to) Real Property prohibits assignment of such lease (or operating/management agreement) without the consent of the lessor or another party thereunder, the Borrowers shall not be required to grant a mortgage on the leasehold interest under such lease, but in such event, the Borrowers agree to diligently and in good faith use its reasonable best efforts to obtain the consent (which consent shall be in form and substance reasonably satisfactory to the Administrative Agent) of the applicable lessor or other party to such leasehold mortgage (and, upon the receipt of such consent, the Borrowers shall promptly grant such leasehold mortgage and comply with the other provisions of this Section 10.15 with respect thereto). (b) In the event any Borrower disposes of any assets or Equity Interests as permitted under, and in compliance with, Section 7.04(b) (including any amendment thereof or consent thereunder), or in the event that the Parent designates any Borrower as an Excluded Subsidiary or a Non-Borrower Subsidiary hereunder and no Default would result from such designation, and so long as such Borrower (or the Parent, in the case of designating a Borrower as an Excluded Subsidiary hereunder) shall have provided the Administrative Agent with such certifications or documents, if any, as the Administrative Agent shall reasonably request, the Administrative Agent will, at the Borrowers’ sole cost and expense, and without recourse to or warranty by the Administrative Agent, execute and deliver all such forms, releases, discharges, assignments, termination statements, and similar documents as the Borrowers may reasonably request in order to release such Person from its Obligations under the Loan Documents and to release the Liens granted to the Administrative Agent with respect to such assets, Equity Interests or Borrower, as applicable.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Compliance with Securities Regulations and Commission Requests The Company, subject to Section 3(b), will comply with the requirements of Rule 430B of the 1933 Act Regulations and will notify the Representatives immediately, and confirm the notice in writing, of (i) the effectiveness of any post-effective amendment to the Registration Statement or any new registration statement relating to the Securities or the filing of any supplement or amendment to the Prospectus, (ii) the receipt of any comments from the Commission with respect to the Registration Statement, (iii) any request by the Commission for any amendment to the Registration Statement or any amendment or supplement to the Prospectus or for additional information, (iv) the issuance by the Commission of any stop order suspending the effectiveness of the Registration Statement or such new registration statement or of any order preventing or suspending the use of any preliminary prospectus relating to the Securities, or of the suspension of the qualification of the Securities for offering or sale in any jurisdiction, or of the initiation or threatening of any proceedings for any of such purposes or of any examination pursuant to Section 8(e) of the 1933 Act concerning the Registration Statement and (v) if the Company becomes the subject of a proceeding under Section 8A of the 1933 Act in connection with the offering of the Securities. The Company will promptly effect the filings required under Rule 424(b), in the manner and within the time period required by Rule 424(b) (without reliance on Rule 424(b)(8)), and will take such steps as it deems necessary to ascertain promptly whether the Prospectus transmitted for filing under Rule 424 was received for filing by the Commission and, in the event that it was not, it will promptly file the Prospectus. The Company will make every reasonable effort to prevent the issuance of any stop order and, if any stop order is issued, to obtain the lifting thereof at the earliest possible moment.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Layoff Procedures Layoffs shall be administered pursuant as follows: An employee with permanent seniority in class shall have the right to displace an employee with less permanent seniority in the same class in any department. All bumping and displacement shall first occur within the department that affected the layoff in question prior to City-wide bumping.

  • Financial Security 5.4.1. To provide financial security the Company is entitled to request from the Client a confirmation of the verification of personal data submitted at the registration of a trading account. For this purpose the Company may at any moment ask the Client to submit a copy of a passport or other equivalent document, certified by a notary (at Company’s discretion). 5.4.2. The Company is entitled to prohibit to deposit or withdraw funds to the third parties. 5.4.3. In case of indication or suspicion of any form of Client's fraudulent activity or violation of conditions of Customer Agreement, the Company in its sole discretion will be entitled to suspend all transactions of deposits or withdrawals.

  • Appointment of Co-Indenture Trustee or Separate Indenture Trustee (a) Notwithstanding any other provisions of this Indenture, at any time, for the purpose of meeting any legal requirement of any jurisdiction in which any part of the Trust Estate may at the time be located, the Indenture Trustee shall have the power and may execute and deliver an instrument to appoint one or more Persons to act as a co-trustee or co-trustees, jointly with the Indenture Trustee, or separate trustee or separate trustees, of all or any part of the Trust Estate, and to vest in such Person or Persons, in such capacity and for the benefit of the Noteholders, such title to the Trust Estate, or any part hereof, and, subject to the other provisions of this Section 6.10, such powers, duties, obligations, rights and trusts as the Indenture Trustee may consider necessary or desirable. No co-trustee or separate trustee under this Indenture shall be required to meet the terms of eligibility as a successor trustee under Section 6.11 and no notice of the appointment of any co-trustee or separate trustee shall be required under Section 6.8. (b) Each separate trustee and co-trustee shall, to the extent permitted by law, be appointed and act subject to the following provisions and conditions: (i) all rights, powers, duties and obligations conferred or imposed upon the Indenture Trustee shall be conferred or imposed upon and exercised or performed by the Indenture Trustee and such separate trustee or co-trustee jointly (it being understood that such separate trustee or co-trustee shall not be authorized to act separately without the Indenture Trustee joining in such act), except to the extent that under any law of any jurisdiction in which any particular act or acts are to be performed the Indenture Trustee shall be incompetent or unqualified to perform such act or acts, in which event such rights, powers, duties and obligations (including the holding of title to the Trust Estate or any portion thereof in any such jurisdiction) shall be exercised and performed singly by such separate trustee or co-trustee, but solely at the direction of the Indenture Trustee; (ii) no trustee under this Indenture shall be personally liable by reason of any act or omission of any other trustee under this Indenture; and (iii) the Indenture Trustee may at any time accept the resignation of or remove any separate trustee or co-trustee. (c) Any notice, request or other writing given to the Indenture Trustee shall be deemed to have been given to each of the then separate trustees and co-trustees as effectively as if given to each of them. Every instrument appointing any separate trustee or co-trustee shall refer to this Indenture and the conditions of this Article VI. Each separate trustee and co-trustee, upon its acceptance of the trusts conferred, shall be vested with the estates or property specified in its instrument of appointment, either jointly with the Indenture Trustee or separately, as may be provided therein, subject to all the provisions of this Indenture, specifically including every provision of this Indenture relating to the conduct of, affecting the liability of, or affording protection to, the Indenture Trustee. Each such instrument shall be filed with the Indenture Trustee. (d) Any separate trustee or co-trustee may at any time constitute the Indenture Trustee its agent or attorney-in-fact with full power and authority, to the extent permitted by law, to do any lawful act under or in respect of this Indenture on its behalf and in its name. If any separate trustee or co-trustee shall die, become incapable of acting, resign or be removed, all of its estates, properties, rights, remedies and trusts shall vest in and be exercised by the Indenture Trustee, to the extent permitted by law, without the appointment of a new or successor trustee.