Security and emergencies Sample Clauses

Security and emergencies. Security – At the time of confirmation, YPRL may require that the Hirer provide external security for the booking and if required, the Hirer must comply with YPRL’s requirements at its own cost. Emergencies - The Hirer must be aware of all emergency procedures and nominate a person to oversee compliance with the emergency procedures in the event of an emergency. Further, all emergency exit doorways and passageways must always be clear and unobstructed. Health and safety – The Hirer must be aware of all health and safety regulations as set by the Victorian State Government regarding Covid-19 procedures and be compliant with YPRL’s Covid safe operations. If your booking time(s) fall outside of the YPRL venue’s regular opening hours you will be required to complete a fire warden and evacuation induction. After hours assistance Please report any maintenance or security issues to the after-hours contact numbers below: If you find any criminal activity or vandalism has occurred at the venue prior to or during your event (if outside of regular building hours), please contact the Police on 000 immediately. You are also required to report the findings to the after-hours number. If the after-hours officer is called to attend the venue due to hirer error e.g. centre alarm managed incorrectly, hirer negligence or an emergency/duress false alarm the hirer may be invoiced a fee of $120.00 for each call out.
AutoNDA by SimpleDocs
Security and emergencies. Security – At the time of confirmation, YPRL may require that the Hirer provide external security for the booking and if required, the Hirer must comply with YPRL’s requirements at its own cost. Emergencies - The Hirer must be aware of all emergency procedures and nominate a person to oversee compliance with the emergency procedures in the event of an emergency. Further, all emergency exit doorways and passageways must always be clear and unobstructed. Health and safety – The Hirer must be aware of all health and safety regulations as set by the Victorian State Government regarding Covid-19 procedures and be compliant with YPRL’s Covid safe operations. If your booking time(s) fall outside of the YPRL venue’s regular opening hours you will be required to complete a fire warden and evacuation induction. After hours assistance Please report any maintenance or security issues to the after-hours contact numbers below: • Banyule: 03 9490 4222 (Ivanhoe Library and Cultural Hub, Watsonia Library) • Nillumbik: 03 9483 8895 (Diamond Valley Library) • Whittlesea: 03 9217 2170 (Mill Park Library, Thomastown Library) If you find any criminal activity or vandalism has occurred at the venue prior to or during your event (if outside of regular building hours), please contact the Police on 000 immediately. You are also required to report the findings to the after-hours number. If the after-hours officer is called to attend the venue due to hirer error e.g. centre alarm managed incorrectly, hirer negligence or an emergency/duress false alarm the hirer may be invoiced a fee of $120.00 for each call out.
Security and emergencies. Security: At the time of confirmation, YPRL may require that the Hirer provide external security for the booking and if required, the Hirer must comply with YPRL’s requirements at its own cost.
Security and emergencies. 11 After-hours assistance .......................................................................... 11 Indemnity .............................................................................................. 11 Disclaimer ............................................................................................. 12 Privacy statement .................................................................................. 12 Our venues with spaces for hire • Diamond Valley Library • Ivanhoe Library and Cultural Hub • Thomastown Library • Watsonia Library • Mill Park Library YPRL facilities and features • Conference and community meeting spaces • Theatrette • Tables and chairs • Heating/cooling • Wireless internetComputer lab • Maker Space • AV (ceiling mounted projector and screen, microphone capability, television and Blu-ray/DVD player, speakers) available in some spaces • Accessible bathrooms • Café (available in some venues) • Kitchens (in certain venues) – includes domestic size fridge, domestic electric oven with 4 burner hot plate, automatic boiling water *please note that if kitchen facilities are required by the Hirer own equipment is to be used. Venue hire agreement The YPRL Hire Agreement must be completed and signed prior to the booking. The person(s) signing the agreement must be over 18 years of age (photo ID will be requested). Where the Hirer intends to use a YPRL venue to provide programs/activities for people under the age of 18 years, the Hirer shall always provide sufficient and competent adult supervision and is responsible for all participants’ behaviour. On receipt of the security bond, acknowledgment of YPRL’s terms and conditions and a completed online application a YPRL staff member will contact you regarding the status of your booking.

Related to Security and emergencies

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!