PROTECTION OF AUTHORITY PROPERTY Sample Clauses

PROTECTION OF AUTHORITY PROPERTY. Contractor’s employees shall perform their duties in a manner which preserves the security of the Authority right-of-way and which protects Authority property from theft or loss due to fire, corrosion, or other damage. The Contractor’s employees shall perform their duties in a manner that makes maximum practicable efficient use of Authority materials. Specific actions under this section include but are not limited to keeping gates locked, reporting acts of theft and vandalism to Authority, keeping material in original, or other secure containers, keeping sensitive material out of the weather.
AutoNDA by SimpleDocs
PROTECTION OF AUTHORITY PROPERTY. (a) The Contractor shall use reasonable care to avoid damaging existing buildings, equipment, and vegetation on or about premises owned by, or under the control of, the Authority. If the Contractor causes damage to any of this property, the Contractor shall replace or repair the damage at no expense to the Authority as the Contracting Officer directs. If the Authority directs that the Contractor make the repair and Contractor fails or refuses to promptly make such repair or replacement, the Contractor shall be liable to the Authority for the cost, plus an administrative fee of ten percent (10%), which may be deducted from any invoice due and owing Contractor. If the Authority elects to make such repair or replacement, then the Contractor shall be liable for the cost, plus an administrative fee of ten percent (10%), which may be deducted from any invoice due and owing to the Contractor or on demand if the Contract is terminated. This provision shall survive termination of the Contract.
PROTECTION OF AUTHORITY PROPERTY. Contractor’s employees shall perform their duties in a manner which preserves the security of Authority right-of-way and which protects Authority property from theft or loss due to fire, corrosion, or other damage. Contractor’s employees shall perform their duties in a manner that makes maximum practicable efficient use of Authority materials. Specific actions under this Section 3.1.4 include but are not limited to (1) keeping gates locked; (2) reporting acts of theft and vandalism to Authority Contract Manager; (3) keeping material in original or other secure containers; (4) keeping sensitive material out of the weather; (5) keeping new, secondhand, and scrap material sorted and in secure areas; (6) keeping new and secondhand steel and treated wood on blocking and not in contact with the ground; (7) making efficient use of secondhand material where appropriate; (8) using good judgment to sort secondhand and scrap material; (9) planning for delivery of materials to minimize re-handling at worksites; (10) properly securing loads on highway trucks or rail vehicles; and (11) keeping Hazardous Materials in appropriate containers for storage and/or disposal.
PROTECTION OF AUTHORITY PROPERTY. You acknowledge and agree that the Service, the Network, the Authority’s various computers, software, communications devices and other components and equipment, and the Facility (collectively, the “Authority Property”) are the property of the Authority. You understand and acknowledge that the Service is provided via a shared network. In its sole discretion and with or without notice to you, the Authority reserves the right to take any action regarding any improper or other use of the Facility Property needed to prevent or minimize harm to the Facility Property or individuals located within the Facility or to prevent or minimize disruption or performance of any Facility Property for the Authority or for others.

Related to PROTECTION OF AUTHORITY PROPERTY

  • Protection of Intellectual Property 1. The Parties shall grant and ensure adequate, effective and non-discriminatory protection of intellectual property rights, and provide for measures for the enforcement of such rights against infringement thereof, counterfeiting and piracy, in accordance with the provisions of this Article, Annex VI and the international agreements referred to therein.

  • City Property All original documents, drawings, electronic media, and other materials prepared by CONTRACTOR pursuant to this Agreement immediately become the exclusive property of the CITY, and shall not be used by CONTRACTOR for any other purpose without the CITY’s prior written consent.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Identity Protection Law Grantee must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-646A.628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600 – 628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but in any event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps Grantee will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines notice required of any such Breach to any individual(s) or entity(ies), Agency will have sole control over the timing, content, and method of such notice, subject to Grantee’s obligations under applicable law.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Time is Money Join Law Insider Premium to draft better contracts faster.