We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Security and Access Control Sample Clauses

Security and Access Control. Advanced security systems monitor the entire data centre 24x7. A closed circuit television system (CCTV) records and archives all activities. Each person accessing the data centre must provide valid identification and is registered when entering and leaving the premises.
Security and Access Control. ShadowVoice offers reliable, full featured hosted VoIP and SIP trunking for businesses from one line to thousands. Enterprise Systems offers a variety of security and access control solutions.
Security and Access ControlContractor shall distribute keys and other access control devices to its employees and subcontractors only in accordance with the distribution policies established by District. Contractor shall be solely responsible for all keys or other access control device issued to its employees/subcontractors. Doors will be opened or unlocked only to areas in which Contractor’s employees/subcontractors are actively working. Doors will be locked and lights turned off once the Services are performed at the end of each day of operations. Contractor’s employees/subcontractors shall not open, unlock, or otherwise allow access to the Facilities for anyone not performing or supporting the Services without the express prior approval of District. In the event keys or other access devices issued to Contractor are lost or stolen, Contractor will report such losses to District immediately and will be liable for the cost of all replacements, including lock changes. Contractor shall not make copies of any keys to the Facilities without District’s express prior permission. Immediately upon the Completion Date, or as soon thereafter as practical, all keys and other access control devices issued to Contractor shall be returned to the appropriate College’s Campus Representative.
Security and Access Control. Overall, the BEAP’s security should comply with the following: - Government’s Security Regulations - Baseline IT Security Policy - IT Security Guidelines - OGCIO Interoperability Framework - Security Risk Assessment and Audit Guidelines
Security and Access Control. If you elect to install software on a wide area network or at a third-party data center, you must retain control of access to and use of the software by your users, and the hosting facility must use current industry standard security, encryption and protection mechanisms to prevent unauthorized access to the Software.
Security and Access Control. As part of the Software, Panzura will implement appropriate security procedures and controls to protect Customer Data from unauthorized access by physical and electronic intrusion as provided in the Panzura Security Addendum located at xxxxx://xxxxxxx.xxx/legal/security-addendum. Panzura will not, under any circumstances, be responsible or liable to Customer or any third party for (i) the removal of Customer Data from the Software by Customer or any third party of Customer; or (ii) any unauthorized access to the Software by third parties caused through illegal or illicit means by way of Customer’s network, infrastructure, or through Customer’s provisioning of credentials. Panzura will promptly report to Customer any unauthorized access upon discovery.
Security and Access Control. 10.1 The Trustees might employ a security company to manage the security of the Scheme and to control access to and from the Scheme 10.2 Owners, occupiers and visitors will be subject to the security measures imposed by the Trustees from time to time relating to security and access control 10.3 Owners will bear the costs incurred by the Body Corporate in communicating from the access control point to the Owner. 5. By adding a new Rule 11
Security and Access Control. Customer is responsible for providing adequate security to prevent unauthorized System access control to Philips (or its third-party vendors) proprietary and confidential information.
Security and Access Control 

Related to Security and Access Control

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Information and Access (a) From the date of this Agreement until the Effective Time, but subject to Section 5.27, upon reasonable notice and subject to applicable Law, the Company will, and will cause its Subsidiaries, and will direct its and their officers, directors, employees, contractors, Representatives and Affiliates to, afford to the officers, employees, counsel, bankers, accountants and other authorized Representatives of Parent and the Parent Special Committee reasonable access during normal business hours and upon reasonable prior notice to all its properties, personnel, books and records for purposes of satisfying Parent’s rights and obligations under this Agreement and furnish promptly to such Persons such information concerning its business, properties, personnel and affairs as such Persons will from time to time reasonably request for purposes of satisfying Parent’s rights and obligations under this Agreement. The Company shall be entitled to have a Representative present at all times during any such inspection, and all such inspections granted pursuant to this Section 5.8 shall be subject to the Company’s reasonable security measures. Subject to the terms of this Agreement, the Company shall maintain and exercise complete control and supervision over the Company and its Subsidiaries. (b) From the date of this Agreement until the Effective Time, subject to applicable Law, Parent shall act reasonably and in good faith in responding to such requests for information as the Company will from time to time reasonably make, to the extent reasonably necessary to enable the Company to consummate the transactions contemplated hereby in accordance with the terms herewith and consistent with the Company’s rights and obligations under this Agreement. (c) No investigation or information provided pursuant to this Section 5.8 shall affect or otherwise obviate or diminish any representations or warranties of any Party or conditions to the obligations of any Party. (d) Each of the Company and Parent will hold all information furnished by or behalf of the other Party or its Representatives pursuant to this Section 5.8 in confidence in accordance with the provisions of that certain Non-Disclosure Agreement, dated as of August 29, 2024 (the “Confidentiality Agreement”), by and between the Company and Parent, provided that Parent shall be permitted to provide information to A/N on a confidential basis as reasonably requested by A/N and Parent shall use reasonable best efforts to cause A/N to comply with the confidentiality and use restrictions set forth in the Confidentiality Agreement with respect to such information. (e) Nothing in this Section 5.8 or in any other part of this Agreement shall require the Company or Parent, as applicable, to permit any inspection of, or to disclose: (i) any information concerning Alternative Company Transaction Proposals or Alternative Parent Transaction Proposals, which shall be governed by Section 5.3 and Section 5.4 (in the case of Alternative Company Transaction Proposals) and Section 5.5 and Section 5.6 (in the case of Alternative Parent Transaction Proposals); (ii) any information regarding the deliberations of the Company Board, Parent Board or Parent Special Committee, as applicable, with respect to the transactions contemplated hereby or any similar transaction or transactions with any other Person, the entry into this Agreement, or any materials provided to the Company Board, Parent Board or Parent Special Committee, as applicable, in connection therewith; (iii) materials prepared by the Parent Special Committee’s or Parent’s financial or legal advisors or by the Company’s financial or legal advisors; or (iv) materials the disclosure of which (A) would jeopardize any attorney-client or other privilege or (B) would contravene any applicable Law, fiduciary duty or confidentiality obligation, provided, that Parent and the Company shall use commercially reasonable efforts to take such actions as may be reasonably required to allow such disclosure to be provided to the other Party or its Representatives without waiving privilege or causing a violation of applicable Law, fiduciary duty or confidentiality obligation. (f) Without limiting the generality of Section 5.8(a), from the date of this Agreement until the Effective Time, the Company will, and will cause its applicable Non-GCI Subsidiaries (and, solely until the consummation of the GCI Divestiture, GCI and its Subsidiaries) to, (i) with respect to any U.S. federal income or other material Tax Return of the Company or any of its Non-GCI Subsidiaries (or, solely with respect to taxable periods (or portions thereof) that end on or prior to the consummation of the GCI Divestiture, GCI and its Subsidiaries) that is required to be filed after the date of this Agreement, make commercially reasonable efforts to deliver a draft of such Tax Return to Parent for review and comment at least fifteen (15) days before it is due and consider in good faith Parent’s reasonable comments received by the Company within five (5) days after Parent received such Tax Return, (ii) with respect to any material Tax audit, action or other proceeding with respect to the Company or any of its Non-GCI Subsidiaries (or, solely with respect to taxable periods (or portions thereof) that end on or prior to the consummation of the GCI Divestiture, GCI and its Subsidiaries), promptly provide any updates (including any communications from a Governmental Authority) to Parent, and (iii) provide to Parent and its Subsidiaries such cooperation, documentation and information as Parent reasonably may request in connection with the foregoing.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Inspection and Access Landlord and its agents, representatives, and contractors may enter the Premises at any reasonable time to inspect the Premises and to make such repairs as may be required or permitted pursuant to this Lease and for any other business purpose. Landlord and Landlord’s representatives may enter the Premises during business hours on not less than 48 hours advance written notice (except in the case of emergencies in which case no such notice shall be required and such entry may be at any time) for the purpose of effecting any such repairs, inspecting the Premises, showing the Premises to prospective purchasers and, during the last year of the Term, to prospective tenants or for any other business purpose. Landlord may erect a suitable sign on the Premises stating the Premises are available to let or that the Project is available for sale. Landlord may grant easements, make public dedications, designate Common Areas and create restrictions on or about the Premises, provided that no such easement, dedication, designation or restriction materially, adversely affects Tenant’s use or occupancy of the Premises for the Permitted Use. At Landlord’s request, Tenant shall execute such instruments as may be necessary for such easements, dedications or restrictions. Tenant shall at all times, except in the case of emergencies, have the right to escort Landlord or its agents, representatives, contractors or guests while the same are in the Premises, provided such escort does not materially and adversely affect Landlord’s access rights hereunder.

  • Records and Access The Advisor, in the conduct of its responsibilities to the Company, shall maintain adequate and separate books and records for the Company’s operations in accordance with GAAP, which shall be supported by sufficient documentation to ascertain that such books and records are properly and accurately recorded. Such books and records shall be the property of the Company and shall be available for inspection by the Board and by counsel, auditors and other authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company and the Operating Partnership.

  • Records Retention and Access 1. Grantee will keep and maintain, as applicable, accurate and complete records necessary to determine compliance with this Contract and applicable laws. 2. Grantee will provide access to its records to DFPS, the Texas State Auditor’s Office (SAO), the Federal Government, and their authorized representatives. 3. Unless otherwise specified in this Contract, Grantee will maintain legible copies of this Contract and all related documentation for a minimum of seven years after the termination of this Contract or seven years after the completion of any litigation or dispute involving the Contract, whichever is longer. 4. THE GRANTEE WILL NOT DISPOSE OF RECORDS BEFORE PROVIDING THE DFPS CONTRACT MANAGER WRITTEN NOTICE OF ITS INTENT TO DISPOSE OF RECORDS AND RECEIVING WRITTEN APPROVAL FROM THE DFPS CONTRACT MANAGER.

  • Records Maintenance and Access Grantee must maintain all financial records relating to this Grant in accordance with generally accepted accounting principles. In addition, Grantee must maintain any other records, whether in paper, electronic or other form, pertinent to this Grant in such a manner as to clearly document Grantee’s performance. All financial records and other records, whether in paper, electronic or other form, that are pertinent to this Grant, are collectively referred to as “Records.” Grantee acknowledges and agrees Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to all Records to perform examinations and audits and make excerpts and transcripts. Grantee must retain and keep accessible all Records for a minimum of six (6) years, or such longer period as may be required by applicable law, following termination of this Grant, or until the conclusion of any audit, controversy or litigation arising out of or related to this Grant, whichever date is later.

  • Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Although a brief overview is provided in this agreement, more detailed information is sent to the nominees in order for them to prepare their exchange.