Security/Access Control Sample Clauses

Security/Access Control. (a) Landlord shall have the right from time to time to adopt such policies, procedures and programs as it shall, in Landlord’s sole discretion, deem necessary or appropriate for the security of the Building, and Tenant shall cooperate with Landlord in the enforcement of, and shall comply with, the policies, procedures and programs adopted by Landlord insofar as the same pertain to Tenant, its agents, employees, contractors and invitees. Tenant acknowledges that the safety and security devices, services and programs provided by Landlord from time to time, if any, may not prevent theft or other criminal acts, or insure the safety of persons or property, and Tenant expressly assumes the risk that any safety device, service or program may not be effective or may malfunction or be circumvented. In all events and notwithstanding any provision of this Lease to the contrary, Landlord and the other Indemnitees (defined below) shall not be liable to Tenant, and Tenant hereby waives any claim against the Indemnitees to the maximum extent permitted by law, for (i) any unauthorized or criminal entry of third parties into the Premises or the Building, (ii) any injury to or death of persons from any unauthorized or criminal acts of third parties, or (iii) any loss of property in and about the Premises or the Building by or from any unauthorized or criminal acts of third parties, regardless of any action, inaction, failure, breakdown, malfunction and/or insufficiency of the security services provided by Landlord, or any allegation of active or passive negligence on the part of Landlord or the other Indemnitees. Tenant shall obtain insurance coverage to the extent Tenant desires protection against criminal acts and other losses.
AutoNDA by SimpleDocs
Security/Access Control. Landlord and Tenant hereby agree to cooperate in good faith to jointly develop access and security procedures and protocol for the Building. So long as Tenant is leasing all of the office space in the Building, Tenant, at Tenant’s sole cost and expense, will have the right to: provide on-site security measure for the Building, including the right to have a lobby guard 24 hours/7days/365 days per year, installation of security cameras, require the registration of all persons entering or leaving the Building during non-business hours of operation, and require identification for access to the Building. In the event Tenant ceases to lease all of the office space in the Building, Landlord may elect to undertake such procedures as Landlord deems appropriate for other multi-tenant office buildings in the Project at Landlord’s expense (subject to Landlord’s right to be reimbursed as part of Operating Costs). Further, Landlord will evacuate the Building for cause, suspected cause, or for drill purposes, and take other actions that Landlord deems necessary or appropriate to prevent any threat of property loss or damage, bodily injury or business interruption; provided, however, that such measure shall be implemented in a way as not to inconvenience Tenants unreasonably with at least thirty (30) days prior notice to Tenant. Further, Landlord shall provide, at Landlord’s cost (subject to reimbursement by Tenant as part of Operating Costs), a guard who shall patrol all of the Project, including the Building, twenty-four (24) hours per day, seven (7) days per week. Tenant shall pay separately all costs and expenses of any security services or measures initiated by Tenant. All costs and security measures provided for or contracted for by Landlord shall be paid by Landlord subject to Tenant’s obligation to reimburse such costs and expenses as part of Operating Costs. If and to the extent Landlord is responsible for security/access control for the Building, Tenant or its Representatives shall cooperate and comply with such security measures, and Tenant shall request that Tenant’s Visitors cooperate and comply with such security measures. Landlord, its agents and employees shall have no liability to Tenant or its Representatives or Visitors for the implementation or exercise of, or the failure to implement or exercise, any such security measures or for any resulting disturbance of Tenant’s use or enjoyment of the Premises. Landlord agrees that Landlord and any of its agents...
Security/Access Control. Landlord to install access control system via badge reader, in order to meet CTPAT requirements, including: • Equipment manufactured by Lenel or equal; • All exterior doors to have panic bars and closers installed; • All exterior doors to have card reader installed and special latch; • All card readers wired back to Computer closet; • Computer closet contains Power Distribution Center and Intelligent Access Controller; • Intelligent controller connects with Tenant’s servers via Ethernet access; • Additional doors may have to be installed to eliminate access to Tenant’s office areas by Landlords personnel; and • All overhead doors need to be equipped with a telescoping gate that can be locked so access is controlled when doors are left open for ventilation, etc.
Security/Access Control. Landlord currently provides basic access control services, which include card access, security patrols and limited camera surveillance. Landlord shall provide one access card, without charge but subject to change without notice, to each employee at the beginning of the Lease Term and to each new employee when they are employed. There will be a $15.00 charge, subject to adjustment without notice, to the Tenant for each card that needs to be replaced or changed for any reason, and that is not returned at the end of the Lease. Landlord will provide two keys to the locks on the corridor doors entering the Premises, with additional keys to be furnished by the Landlord at Tenant’s expense. The Landlord at Tenant’s expense shall provide any keys or locks needed within the Premises. Landlord and Tenant shall cooperate in good faith to coordinate access policies, procedures, and codes for employees, maintenance personnel, security personnel, and other persons who may need access to the Premises. Landlord’s security personnel shall have access to patrol and monitor all reasonable areas, including without limitation server rooms, boilers, chillers, telephone rooms, conduit areas, common areas, and office space. Notwithstanding the foregoing, any security services are provided at the complete discretion of the Landlord and are not to be construed as an obligation of the Landlord under the Lease, except that Landlord shall have the obligation to maintain and repair the card access equipment as part of the Operating Expenses (defined in Exhibit E) as long as Landlord uses such card system to control access to the building. Landlord reserves the right to change these services upon notice. Landlord shall not be held liable for any failure to provide security services or take other security measures for the Building or Park.
Security/Access Control. The Contractor’s staff entering the premises must sign in at Reception and must obtain a temporary permit, which must be returned to Reception at the end of the working day. The Contractor’s staff to be visibly identified as staff members of the company by wearing a uniform with the Contractor’s company logo on it.

Related to Security/Access Control

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Control Areas Tenant shall be allowed to utilize up to its pro rata share of the Hazardous Materials inventory within any control area or zone (located within the Premises), as designated by the applicable building code, for chemical use or storage. As used in the preceding sentence, Tenant’s pro rata share of any control areas or zones located within the Premises shall be determined based on the rentable square footage that Tenant leases within the applicable control area or zone. For purposes of example only, if a control area or zone contains 10,000 rentable square feet and 2,000 rentable square feet of a tenant’s premises are located within such control area or zone (while such premises as a whole contains 5,000 rentable square feet), the applicable tenant’s pro rata share of such control area would be 20%.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

Time is Money Join Law Insider Premium to draft better contracts faster.