Security/Access Control Sample Clauses

Security/Access Control. (a) Landlord shall have the right from time to time to adopt such policies, procedures and programs as it shall, in Landlord’s sole discretion, deem necessary or appropriate for the security of the Building, and Tenant shall cooperate with Landlord in the enforcement of, and shall comply with, the policies, procedures and programs adopted by Landlord insofar as the same pertain to Tenant, its agents, employees, contractors and invitees. Tenant acknowledges that the safety and security devices, services and programs provided by Landlord from time to time, if any, may not prevent theft or other criminal acts, or insure the safety of persons or property, and Tenant expressly assumes the risk that any safety device, service or program may not be effective or may malfunction or be circumvented. In all events and notwithstanding any provision of this Lease to the contrary, Landlord and the other Indemnitees (defined below) shall not be liable to Tenant, and Tenant hereby waives any claim against the Indemnitees to the maximum extent permitted by law, for (i) any unauthorized or criminal entry of third parties into the Premises or the Building, (ii) any injury to or death of persons from any unauthorized or criminal acts of third parties, or (iii) any loss of property in and about the Premises or the Building by or from any unauthorized or criminal acts of third parties, regardless of any action, inaction, failure, breakdown, malfunction and/or insufficiency of the security services provided by Landlord, or any allegation of active or passive negligence on the part of Landlord or the other Indemnitees. Tenant shall obtain insurance coverage to the extent Tenant desires protection against criminal acts and other losses. (b) In no event shall Landlord be liable for damages resulting from any error with regard to the admission to or the exclusion from the Building of any person. In the case of invasion, mob, riot, public demonstration or other circumstances rendering such action advisable in Landlord’s opinion, Landlord reserves the right to prevent access to the Building during the continuance of the same by such action as Landlord may deem appropriate, including closing doors. (c) In the event of any picketing, public demonstration or other threat to the security of the Building that is attributable in whole or in part to Tenant, Tenant shall reimburse Landlord for any costs incurred by Landlord in connection with such picketing, demonstration or other threat in o...
AutoNDA by SimpleDocs
Security/Access Control. Landlord to install access control system via badge reader, in order to meet CTPAT requirements, including: • Equipment manufactured by Lenel or equal; • All exterior doors to have panic bars and closers installed; • All exterior doors to have card reader installed and special latch; • All card readers wired back to Computer closet; • Computer closet contains Power Distribution Center and Intelligent Access Controller; • Intelligent controller connects with Tenant’s servers via Ethernet access; • Additional doors may have to be installed to eliminate access to Tenant’s office areas by Landlords personnel; and • All overhead doors need to be equipped with a telescoping gate that can be locked so access is controlled when doors are left open for ventilation, etc.
Security/Access Control. Landlord and Tenant hereby agree to cooperate in good faith to jointly develop access and security procedures and protocol for the Building. So long as Tenant is leasing all of the office space in the Building, Tenant, at Tenant’s sole cost and expense, will have the right to: provide on-site security measure for the Building, including the right to have a lobby guard 24 hours/7days/365 days per year, installation of security cameras, require the registration of all persons entering or leaving the Building during non-business hours of operation, and require identification for access to the Building. In the event Tenant ceases to lease all of the office space in the Building, Landlord may elect to undertake such procedures as Landlord deems appropriate for other multi-tenant office buildings in the Project at Landlord’s expense (subject to Landlord’s right to be reimbursed as part of Operating Costs). Further, Landlord will evacuate the Building for cause, suspected cause, or for drill purposes, and take other actions that Landlord deems necessary or appropriate to prevent any threat of property loss or damage, bodily injury or business interruption; provided, however, that such measure shall be implemented in a way as not to inconvenience Tenants unreasonably with at least thirty (30) days prior notice to Tenant. Further, Landlord shall provide, at Landlord’s cost (subject to reimbursement by Tenant as part of Operating Costs), a guard who shall patrol all of the Project, including the Building, twenty-four (24) hours per day, seven (7) days per week. Tenant shall pay separately all costs and expenses of any security services or measures initiated by Tenant. All costs and security measures provided for or contracted for by Landlord shall be paid by Landlord subject to Tenant’s obligation to reimburse such costs and expenses as part of Operating Costs. If and to the extent Landlord is responsible for security/access control for the Building, Tenant or its Representatives shall cooperate and comply with such security measures, and Tenant shall request that Tenant’s Visitors cooperate and comply with such security measures. Landlord, its agents and employees shall have no liability to Tenant or its Representatives or Visitors for the implementation or exercise of, or the failure to implement or exercise, any such security measures or for any resulting disturbance of Tenant’s use or enjoyment of the Premises. Landlord agrees that Landlord and any of its agents...
Security/Access Control. Landlord currently provides basic access control services, which include card access, security patrols and limited camera surveillance. Landlord shall provide one access card, without charge but subject to change without notice, to each employee at the beginning of the Lease Term and to each new employee when they are employed. There will be a $15.00 charge, subject to adjustment without notice, to the Tenant for each card that needs to be replaced or changed for any reason, and that is not returned at the end of the Lease. Landlord will provide two keys to the locks on the corridor doors entering the Premises, with additional keys to be furnished by the Landlord at Tenant’s expense. The Landlord at Tenant’s expense shall provide any keys or locks needed within the Premises. Landlord and Tenant shall cooperate in good faith to coordinate access policies, procedures, and codes for employees, maintenance personnel, security personnel, and other persons who may need access to the Premises. Landlord’s security personnel shall have access to patrol and monitor all reasonable areas, including without limitation server rooms, boilers, chillers, telephone rooms, conduit areas, common areas, and office space. Notwithstanding the foregoing, any security services are provided at the complete discretion of the Landlord and are not to be construed as an obligation of the Landlord under the Lease, except that Landlord shall have the obligation to maintain and repair the card access equipment as part of the Operating Expenses (defined in Exhibit E) as long as Landlord uses such card system to control access to the building. Landlord reserves the right to change these services upon notice. Landlord shall not be held liable for any failure to provide security services or take other security measures for the Building or Park.
Security/Access Control. The Contractor’s staff entering the premises must sign in at Reception and must obtain a temporary permit, which must be returned to Reception at the end of the working day. The Contractor’s staff to be visibly identified as staff members of the company by wearing a uniform with the Contractor’s company logo on it.

Related to Security/Access Control

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Facility Access Notwithstanding any other provision of the Agreement, the Customer shall provide the Authority with such access to the Facility, and such documentation, as the Authority deems necessary to determine the Customer’s compliance with the Customer’s Supplemental Commitments specified in this Schedule B.

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!