Safety & Security Products Sample Clauses

Safety & Security Products. Software supplied and installed as part of a safety & security system is designed to supplement existing security procedures of the Customer. The Customer should review its whole process and ensure the proper working of the procedures that are being supplemented.
AutoNDA by SimpleDocs

Related to Safety & Security Products

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Product ACCEPTANCE Unless otherwise provided by mutual agreement of the Authorized User and the Contractor, Authorized User(s) shall have thirty (30) days from the date of delivery to accept hardware products and sixty (60) days from the date of delivery to accept all other Product. Where the Contractor is responsible for installation, acceptance shall be from completion of installation. Failure to provide notice of acceptance or rejection or a deficiency statement to the Contractor by the end of the period provided for under this clause constitutes acceptance by the Authorized User(s) as of the expiration of that period. The License Term shall be extended by the time periods allowed for trial use, testing and acceptance unless the Commissioner or Authorized User agrees to accept the Product at completion of trial use. Unless otherwise provided by mutual agreement of the Authorized User and the Contractor, Authorized User shall have the option to run testing on the Product prior to acceptance, such tests and data sets to be specified by User. Where using its own data or tests, Authorized User must have the tests or representative set of data available upon delivery. This demonstration will take the form of a documented installation test, capable of observation by the Authorized User, and shall be made part of the Contractor’s standard documentation. The test data shall remain accessible to the Authorized User after completion of the test. In the event that the documented installation test cannot be completed successfully within the specified acceptance period, and the Contractor or Product is responsible for the delay, Authorized User shall have the option to cancel the order in whole or in part, or to extend the testing period for an additional thirty (30) day increment. Authorized User shall notify Contractor of acceptance upon successful completion of the documented installation test. Such cancellation shall not give rise to any cause of action against the Authorized User for damages, loss of profits, expenses, or other remuneration of any kind. If the Authorized User elects to provide a deficiency statement specifying how the Product fails to meet the specifications within the testing period, Contractor shall have thirty (30) days to correct the deficiency, and the Authorized User shall have an additional sixty (60) days to evaluate the Product as provided herein. If the Product does not meet the specifications at the end of the extended testing period, Authorized User, upon prior written notice to Contractor, may then reject the Product and return all defective Product to Contractor, and Contractor shall refund any monies paid by the Authorized User to Contractor therefor. Costs and liabilities associated with a failure of the Product to perform in accordance with the functionality tests or product specifications during the acceptance period shall be borne fully by Contractor to the extent that said costs or liabilities shall not have been caused by negligent or willful acts or omissions of the Authorized User’s agents or employees. Said costs shall be limited to the amounts set forth in the Limitation of Liability Clause for any liability for costs incurred at the direction or recommendation of Contractor.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Third Party Products and Services Through its Product(s), Palo Alto Networks may make available to you third-party products or services (“third-party apps”) which contain features designed to interoperate with our Products. To use such features, you must either obtain access to such third-party apps from their respective providers or permit Palo Alto Networks to obtain access on your behalf. All third-party apps are optional and if you choose to utilize such third-party apps:

  • Procurement of Goods and Works 3. Except as ADB may otherwise agree, Goods and Works shall only be procured on the basis of the methods of procurement set forth below:

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA.

  • Third Party Products 1. Third Party Hardware. We will sell, deliver, and install onsite the Third Party Hardware, if you have purchased any, for the price set forth in the Investment Summary. Those amounts are payable in accordance with our Invoicing and Payment Policy.

  • Prescription Drugs and Diabetic Equipment or Supplies Biological products for allergen immunotherapy and vaccinations. • Blood fractions. • Compound prescription drugs that are not made up of at least one legend drug. • Bulk powders and chemicals used in compound prescriptions that are not FDA approved, are not covered unless listed on our formulary. • Prescription drugs prescribed or dispensed outside of our dispensing guidelines. • Prescription drugs ordered or prescribed based solely on online questionnaires, telephonic interviews, surveys, emails, or any other marketing solicitation methods, whether alone or in combination. • Prescription drugs that have not proven effective according to the FDA. • Prescription drugs used for cosmetic purposes. • Prescription drugs purchased from a non-designated pharmacy, if a pharmacy has been designated for you through the Pharmacy Home Assignment program. • Experimental prescription drugs including those placed on notice of opportunity hearing status by the Federal Drug Efficacy Study Implementation (DESI). • Prescription drugs provided to you that are not dispensed by a network pharmacy or covered under your medical plan. • Prescription drugs and diabetic equipment and supplies purchased at a non-network pharmacy unless indicated as covered in the Summary of Pharmacy Benefits. • Prescription drug related medical supplies except for diabetic, regardless of the reason prescribed, the intended use, or medical necessity. Examples include, but are not limited to, alcohol pads, bandages, wraps or pill holders. • Off-label use of prescription drugs except as described in Experimental or Investigational Services in Section 3; • Prescribed weight-loss drugs. • Replacement of prescription drugs resulting from a lost, stolen, broken or destroyed prescription order or refill. • Therapeutic devices and appliances, including hypodermic needles and syringes except when used to administer insulin. • Prescription drugs, therapeutic equivalents, or any other pharmaceuticals used to treat sexual dysfunctions. • Vitamins, unless specifically listed as a covered healthcare service. • A prescription drug refill greater than the refill number authorized by your physician, more than a year from the date of the original prescription, or limited by law. • Long acting opioids and other controlled substances, nicotine replacement therapy, and specialty prescription drugs when purchased from a mail order pharmacy. • Prescription drugs and specialty prescription drugs when the required prescription drug preauthorization is not obtained. • Certain prescription drugs that have an over-the-counter (OTC) equivalent. • Prescriptions filled through an internet pharmacy that is not a verified internet pharmacy practice site certified by the National Association of Boards of Pharmacy. • Illegal drugs, including medical marijuana, which are dispensed in violation of state and/or federal law. Private Duty Nursing Services • Services of a nurse's aide. • Services of a private duty nurse: o when the primary duties are limited to bathing, feeding, exercising, homemaking, giving oral medications or acting as companion or sitter; o after the caregiver or patient have demonstrated the ability to carry out the plan of care; o provided outside the home. Examples include at school, or in a nursing or assisted living facility; o that are duplication or overlap of services. Examples include when a person is receiving hospice care services or for the same hours of a skilled nursing home care visit; o that are for observation only; and o provided as part-time/intermittent and not continuous care. • Maintenance care when the condition has stabilized including routine ostomy care or tube feeding administration or if the anticipated need is indefinite. • Twenty-four (24) hour private duty nursing care for a person without an available caregiver in the home. • Respite care (e.g., care during a caregiver vacation) or private duty nursing so that the caregiver may attend work or school. Surgery Services • Abdominoplasty. • Brow ptosis surgery. • Cervicoplasty. • Chemical exfoliations, peels, abrasions, dermabrasions, or planing for acne, scarring, wrinkling, sun damage or other benign conditions. • Correction of variations in normal anatomy including augmentation mammoplasty, mastopexy, and correction of congenital breast asymmetry. • Dermabrasion. • Ear piercing or repair of a torn earlobe. • Excision of excess skin or subcutaneous tissue except for panniculectomy. • Genioplasty. • Hair transplants. • Hair removal including electrolysis epilation, unless in relation to gender reassignment services or skin grafting. • Inverted nipple surgery. • Laser treatment for acne and acne scars. • Osteoplasty - facial bone reduction. • Otoplasty. • Procedures to correct visual acuity including but not limited to cornea surgery or lens implants. • Removal of asymptomatic benign skin lesions. • Repeated cauterizations or electrofulguration methods used to remove growths on the skin. • Rhinoplasty.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!