Restriction of Access Sample Clauses
Restriction of Access. To Seller’s Knowledge, there are no current federal, state, county or municipal plans to materially restrict or materially change access to any part of the Real Property from any highway or road leading directly to or abutting any part of the Real Property.
Restriction of Access. Tempe reserves the rights to: (i) prevent or restrict access to any portion of EVBOM by such security procedures or devices as Tempe may consider necessary or appropriate; (ii) control or prevent access by and remove any person who is loitering or whose presence in the judgment of Tempe’s security or facilities management personnel is prejudicial to the safety, character and interests of EVBOM or who is in the judgment of such personnel is intoxicated or under the influence of liquor or drugs; and (iii) limit or prevent access to all or any portion of EVBOM, activate emergency controls or procedures or otherwise take such action or preventative measures deemed necessary by Tempe for the safety of RPTA or other occupants of EVBOM or the protection of EVBOM or other property located thereon or therein, in case of fire or other casualty, riot or other civil disorder, strike or labor unrest, public excitement or other dangerous condition or threat thereof.
Restriction of Access. In the event an Uplifting Service Workshop Leader leaves the employment of Client or Client terminates their relationship, Client will notify Licensor and provide Licensor with updated contact information for such Uplifting Service Workshop Leader, prior to or within 10 days upon termination.
Restriction of Access. When asked if threat/intrusion (cyber intelligences) information shared between organisations be restricted to CISOs, the group was split, with 11 saying Yes and 15 saying No. Those who said no, indicated a range of reasons: • It depends on the organisational structure and where the security team / unit is located: cyber intelligence should be made available where it is needed / to those who have to act on the information. • It should be 'trusted' persons (not just CISOs), to ensure information is available to those persons best placed to analyse and act upon it. • CIOs and IT staff. • CISOs could present a 'bottleneck’. • The CISO must have all the information to coordinate the different teams/areas. • The trusted network should be limited to cyber security professionals to prevent confusion or panic. • Relevant information should be distributed to expert analysts and potentially to testers or designers. • It depends on the size of the organisation, number of people involved in security. • For sharing information inside the organisation, a confidentiality policy controls distribution of information inside the organisation (anonymised if required). • IT manager level. • Information sharing must start on a technical level. CISOs usually do not have the capability to present and consume this information in an appropriate way. • SOC leads in our company so SOC leader or SOC contact is an ideal point for sharing. While there are some conflicting views expressed, the general consensus seems to be that for each organisation, they have to decide on the main point of contact, and the internal policy for distribution. Relevant shares include cyber security professionals (analysis and policy adjustment), system designers and engineers etc. (repair/mitigation). Interestingly, when sharing with a wider group (CISO and other team members) only 26% of respondents suggest recipients should receive all the cyber intelligence. The majority (74%) suggest they should receive only part of the information, depending on their role (i.e. only what is relevant to their job). If information of cyber threats/incidents is shared between railway stakeholders, via a trusted point of contact, the decision on who to provide with “selected” information might be part of the trust relationship (i.e. decided by internal policy).
Restriction of Access. Tempe reserves the rights to: (i) prevent or restrict access to any portion of City Property by such security procedures or devices as Tempe may consider necessary or appropriate, provided that such restricted access shall not impair NSAA’s use of the City Property for NSAA Parking in non-emergency situations; (ii) control or prevent access by and remove any person who is loitering or whose presence in the judgment of Tempe’s security or facilities management personnel is prejudicial to the safety, character and interests of City Property or who is in the judgment of such personnel is intoxicated or under the influence of liquor or drugs; and (iii) limit or prevent access to all or any portion of City Property, activate emergency controls or procedures or otherwise take such action or preventative measures deemed necessary by Tempe for the safety of NSAA or other occupants of City Property or the protection of City Property or other property located thereon or therein, in case of fire or other casualty, riot or other civil disorder, strike or labor unrest, public excitement or other dangerous condition or threat thereof.
Restriction of Access. Seller has no Knowledge of any current federal, state, county or municipal plans to materially restrict or materially change access to any part of the Property from any highway or road leading directly to or abutting any part of the Property.
Restriction of Access. Use reasonable efforts to ensure that access is restricted to Authorized Users, and that Authorized Users are made aware of, the terms and conditions of this Agreement. Participating Institutions will use reasonable efforts to protect the Licensed Material from any use that is not permitted under this Agreement.
Restriction of Access. 0.0. Xxx Sky may restrict a User’s access to the Service immediately if Red Sky reasonably believes that User Abused the Service or associated technical support resources. (“User” means the End User’s user typically an employee, agent, or visitor that uses the End User’s telephony system). Red Sky may restrict a User’s access to the Service by written notice, effective in ten (10) days, if User’s hardware or software is not compatible with the Service or if User engages in any activity that would be a material breach of this Agreement if End User engaged in that activity, unless the breach is cured within the 10 day period.
Restriction of Access. After the Commencement Date, no Contractor Person may enter the Prison to undertake Maintenance Work, unless the Contractor Person:
(1) holds a valid Prison Access Permit; and
(2) complies with all other requirements of the Principal.
Restriction of Access. CIE agrees that it will not allow members of the general public, or others persons not employees of CIE or Affiliate Contractor/Consultants (collectively referred to as “Public”) from having access any locations of its facility in Xxxxxx wherein the Corn Oil processing equipment is housed. Further, CIE will not publish or otherwise disseminate Technology to the Public and will act to reasonably prevent the Public from gaining access to Technology that is contained or otherwise used within the CIE Xxxxxx facility.