Secure Areas i. Contractor has a physical and environmental policy in place, with standards and guidelines that have been documented and obtained management approval, that is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness;
ii. Contractor’s secure areas are protected by appropriate entry controls to ensure that only authorized personnel are allowed access; and
iii. Contractor’s physical protection and guidelines for working in secure areas have been adequately designed and applied.
Secure Areas. Supplier will secure all areas, including loading docks, holding areas, telecommunications areas, cabling areas and off-site areas that contain Information Processing Systems or media containing Confidential Information by the use of appropriate security controls in order to ensure that only authorized personnel are allowed access and to prevent damage and interference. The following controls will be implemented:
(a) Access will be controlled and restricted by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls. A record of all accesses will be securely maintained;
(b) All personnel will be required to wear some form of visible identification to identify them as employees, Suppliers, visitors, et cetera;
(c) Visitors to secure areas will be supervised, or cleared for non-escorted accessed via an appropriate background check. Their date and time of entry and departure will be recorded; and
(d) Physically secure and maintain control over all paper and electronic media (e.g., computers, electronic media, paper receipts, paper reports, and faxes) that contain Company Data.
Secure Areas. The Contractor must ensure that there are defined physical perimeters and barriers, with physical entry controls and working procedures, to protect the premises, offices, rooms, delivery/loading areas etc of all areas in which the University Data are stored or Processed, against unauthorised access. The Contractor should seek specialist advice in order to put in place appropriate measures to mitigate the risk of and protect against fires, floods, earthquakes, bombs etc.
Secure Areas. Contractor has a physical and environmental policy in place, with standards and guidelines that have been documented and obtained management approval, that is reviewed no less frequently than annually and is maintained to ensure its continuing suitability, adequacy and effectiveness; Contractor’s secure areas are protected by appropriate entry controls to ensure that only authorized personnel are allowed access; and Contractor’s physical protection and guidelines for working in secure areas have been adequately designed and applied. Contractor’s equipment, and the equipment Contractor may utilize in its operations that is owned by a third party, is maintained to ensure its continued availability and integrity; and Contractor’s security measures have been applied to off-site equipment to address the risks of working outside the Contractor’s premises. Contractor’s operating procedures have been documented, maintained, and made available to all users who require them; Contractor controls changes to information processing facilities and systems; and Contractor has segregated duties and areas of responsibility to reduce opportunities for unauthorized or unintentional modification or misuse of Contractor’s assets. Security controls, service definitions and delivery levels included in Contractor’s third-party service delivery agreements are implemented, operated, and maintained by the third party; and The services, reports and records provided by third parties are regularly monitored, reviewed and audited by Contractor.
Secure Areas. Restrict, control and monitor all physical and logical areas in Consultant’s IT environments that contain City private and confidential information, servers, switches, developers and administrators’ work areas, or other operationally sensitive equipment (“Secure Area”). Physical Secure Areas controls are addressed are addressed in Physical Controls (Section 2.4). Logical Secure Areas controls are addressed in Technical Controls (Section 2.5) and Remote Access (APPENDIX D).
Secure Areas. Tenant may designate up to two (2) areas of the Premises totaling no more than five hundred (500) rentable square feet of space as “Secure Areas” should Tenant require such areas for the purpose of securing certain valuable property or confidential information. Notwithstanding any provision of this Lease to the contrary, Landlord may not enter such Secured Areas except in the case of emergency or in the event of a Landlord inspection, in which latter case Landlord shall provide Tenant with three (3) days’ prior written notice of the specific date and time of such Landlord inspection. Tenant shall provide Landlord with a key for such Secure Areas (to be held pursuant to a security procedure reasonably satisfactory to Tenant) for Landlord’s use for entry purposes in the event of an emergency.
Secure Areas. 11.1.1 Physical security perimeter Physical Security provided by onsite security
11.1.2 Physical entry controls Access control on all external doors.
Secure Areas. 111 SELF INSURANCE...........................................................64 SELF-HELP AMOUNT...
Secure Areas. 28 13. INSURANCE.................................................................. 28 13.1 All-Risk Insurance................................................... 28 13.2 Public Liability And Property Damage Insurance....................... 29 13.3
Secure Areas. Access to DCC secure areas is restricted and maintenance personnel shall not be permitted to enter these areas without express permission and must also accompanied by appropriately security cleared supplier staff, or DCC staff. For the following areas, maintenance should be conducted out of hours wherever possible when risk is reduced; • Security Operating Centre/Technical Operating Centre; and • Communications Room