Security Access System Sample Clauses

Security Access System. Provided that Tenant obtains Landlord’s prior written consent for such installations (which consent shall not be unreasonably withheld, conditioned, or delayed), Tenant shall have the right to install a cardkey based security access system on the Premises.
AutoNDA by SimpleDocs
Security Access System. 15 6.7 HVAC ENERGY MANAGEMENT COMPUTER SYSTEM . . . . . . . . . . . . . . .15 6.8
Security Access System. Tenant will purchase and install a PC-based system and software to maintain security access for the Premises. Tenant shall immediately notify Landlord's security office of all major alarm events as they occur. Tenant will provide Landlord with active security access cards for Landlord's access to the Premises. Landlord will use the security cards only for emergency access during nonbusiness hours and will access the Premises during business hours only when accompanied by a Tenant escort.
Security Access System. (a) Landlord and Tenant acknowledge that, in addition to the Base Building Modifications that Tenant has previously requested, Tenant has requested, and Landlord has agreed to install, a Kastle security access system in the Building rather than a Datawatch security access system. Such modification constitutes a Base Building Modification under the Lease. The difference between the cost to install and maintain such Kastle security access system and the cost to install and maintain the Datawatch security access system shall be “Base Building Modification Costs” under the Lease. Such Base Building Modification Costs consist of a charge of $14,676.00 the (“Upfront Kastle Charge”) to pay for the increased upfront installation costs arising from such Base Building Modification. Tenant agrees to pay to Landlord the Upfront Kastle Charge within thirty (30) days after receiving an invoice therefor from Landlord.
Security Access System. “Security Access System” means the system used to control access throughout the Building, including wiring, central control units and peripheral control units. [Discuss]

Related to Security Access System

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • PFPC System PFPC shall retain title to and ownership of any and all data bases, computer programs, screen formats, report formats, interactive design techniques, derivative works, inventions, discoveries, patentable or copyrightable matters, concepts, expertise, patents, copyrights, trade secrets, and other related legal rights utilized by PFPC in connection with the services provided by PFPC to the Fund.

Time is Money Join Law Insider Premium to draft better contracts faster.