Restriction of Access. To Seller’s Knowledge, there are no current federal, state, county or municipal plans to materially restrict or materially change access to any part of the Real Property from any highway or road leading directly to or abutting any part of the Real Property.
Restriction of Access. Tempe reserves the rights to: (i) prevent or restrict access to any portion of EVBOM by such security procedures or devices as Tempe may consider necessary or appropriate; (ii) control or prevent access by and remove any person who is loitering or whose presence in the judgment of Tempe’s security or facilities management personnel is prejudicial to the safety, character and interests of EVBOM or who is in the judgment of such personnel is intoxicated or under the influence of liquor or drugs; and (iii) limit or prevent access to all or any portion of EVBOM, activate emergency controls or procedures or otherwise take such action or preventative measures deemed necessary by Tempe for the safety of RPTA or other occupants of EVBOM or the protection of EVBOM or other property located thereon or therein, in case of fire or other casualty, riot or other civil disorder, strike or labor unrest, public excitement or other dangerous condition or threat thereof.
Restriction of Access. Tempe reserves the rights to: (i) prevent or restrict access to any portion of City Property by such security procedures or devices as Tempe may consider necessary or appropriate, provided that such restricted access shall not impair NSAA’s use of the City Property for NSAA Parking in non-emergency situations; (ii) control or prevent access by and remove any person who is loitering or whose presence in the judgment of Tempe’s security or facilities management personnel is prejudicial to the safety, character and interests of City Property or who is in the judgment of such personnel is intoxicated or under the influence of liquor or drugs; and (iii) limit or prevent access to all or any portion of City Property, activate emergency controls or procedures or otherwise take such action or preventative measures deemed necessary by Tempe for the safety of NSAA or other occupants of City Property or the protection of City Property or other property located thereon or therein, in case of fire or other casualty, riot or other civil disorder, strike or labor unrest, public excitement or other dangerous condition or threat thereof.
Restriction of Access. In the event an Uplifting Service Workshop Leader leaves the employment of Client or Client terminates their relationship, Client will notify Licensor and provide Licensor with updated contact information for such Uplifting Service Workshop Leader, prior to or within 10 days upon termination.
Restriction of Access. When asked if threat/intrusion (cyber intelligences) information shared between organisations be restricted to CISOs, the group was split, with 11 saying Yes and 15 saying No. Those who said no, indicated a range of reasons: • It depends on the organisational structure and where the security team / unit is located: cyber intelligence should be made available where it is needed / to those who have to act on the information. • It should be 'trusted' persons (not just CISOs), to ensure information is available to those persons best placed to analyse and act upon it. • CIOs and IT staff. • CISOs could present a 'bottleneck’. • The CISO must have all the information to coordinate the different teams/areas. • The trusted network should be limited to cyber security professionals to prevent confusion or panic. • Relevant information should be distributed to expert analysts and potentially to testers or designers. • It depends on the size of the organisation, number of people involved in security. • For sharing information inside the organisation, a confidentiality policy controls distribution of information inside the organisation (anonymised if required). • IT manager level. • Information sharing must start on a technical level. CISOs usually do not have the capability to present and consume this information in an appropriate way. • SOC leads in our company so SOC leader or SOC contact is an ideal point for sharing. While there are some conflicting views expressed, the general consensus seems to be that for each organisation, they have to decide on the main point of contact, and the internal policy for distribution. Relevant shares include cyber security professionals (analysis and policy adjustment), system designers and engineers etc. (repair/mitigation). Interestingly, when sharing with a wider group (CISO and other team members) only 26% of respondents suggest recipients should receive all the cyber intelligence. The majority (74%) suggest they should receive only part of the information, depending on their role (i.e. only what is relevant to their job). If information of cyber threats/incidents is shared between railway stakeholders, via a trusted point of contact, the decision on who to provide with “selected” information might be part of the trust relationship (i.e. decided by internal policy).
Restriction of Access. Use reasonable efforts to ensure that access is restricted to Authorized Users, and to protect the Licensed Material from any use that is not permitted under this Agreement.
Restriction of Access. Seller has no knowledge of any current federal, state, county or municipal plans to materially restrict or materially change access to any part of the Real Property from any highway or road leading directly to or abutting any part of the Real Property.
Restriction of Access. 0.0.Xxx Sky may restrict a User’s access to the Service immediately if Red Sky reasonably believes that User Abused the Service or associated technical support resources. (“
Restriction of Access. 5.7 In the event that the payment shall remain outstanding for a period of fourteen (14) days past the due date for payment, the Operator may restrict the User's access to the Infrastructure. The restriction can apply to the management, staff and vehicles of the User or parties in any way connected to the User. The restriction can apply until all amounts owing by the User have been paid or arrangements satisfactory to the Operator for payment have been made.
Restriction of Access. Red Sky may restrict or terminate the access of any End User’s user ("User") to the E911 System: