Security Access Management Sample Clauses

Security Access Management to Xxxxxxx Security The Company and the Union agree that if the job duties and functions outsourced to either ECOVA, Inc. or Xxxxxxx Security continue to be performed and are no longer conducted or fulfilled by either vendor, those duties and functions will revert to Bargaining Unit personnel. If at any time the Company intends to seek additional changes in how this work is performed, the Company will negotiate with the Union regarding impact to bargaining unit employees.
AutoNDA by SimpleDocs

Related to Security Access Management

  • Security System Landlord shall not be obligated to provide or maintain any security patrol or security system. Landlord shall not be responsible for the quality of any such patrol or system which may be provided hereunder or for damage or injury to Tenant, its employees, invitees or others due to the failure, action or inaction of such patrol or system.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Maintenance and Support Licensee is solely responsible for providing all maintenance and support to its customers of the Licensed Products. Licensor has, and shall have, no obligation to provide any maintenance or support to Licensee or any of Licensee’s customers with respect to any Technology and/or Licensed Products.

  • Maintenance and Support Services Distributor shall provide Maintenance and Support Services to all of its Customers of Licensed Software as set forth in Sections 3.4(a) and 3.4(b) below. Distributor may require Customers to provide the own First-Line Support: however, in no event shall Siebel be responsible for First-Line or Second-Line Support. Subject to Distributor's payment of the Maintenance Fees set forth in EXHIBIT A Siebel shall provide Third-Line Support to Distributor in accordance with Siebel's then current Maintenance and Support Services Policy. Distributor shall be responsible for all support related to the Value Added Offering.

  • Construction Management Landlord or its Affiliate or agent shall supervise the Work, make disbursements required to be made to the contractor, and act as a liaison between the contractor and Tenant and coordinate the relationship between the Work, the Building and the Building’s Systems. In consideration for Landlord’s construction supervision services, Tenant shall pay to Landlord a construction supervision fee equal to three percent (3%) of Tenant’s Costs specified in Section 7.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Maintenance Program LESSEE's Maintenance Program

  • Program Management (WBS 1.1) All components of the Project Management Plan as implemented for the Base Contract and Options 1-4 will be reviewed and amended to reflect specific needs for Option 5 and the outcome of continuous process improvement evaluations.

  • Project Management With respect to each Project Plan, each party will appoint a project manager who will be the party responsible for overseeing the Project Plan.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!