SECURITY AREA Sample Clauses

SECURITY AREA. 36. The Government undertakes to adopt administrative measures to guarantee the necessary conditions for the effective exercise of the civil rights of URNG members, particularly the rights to life, security and physical integrity. Respect for this undertaking shall be subject to special verification by the international verification authority, which may arrange for URNG members to be accompanied temporarily when the need arises. 37. The Government shall pay particular attention to any complaint of acts or incidents that threaten the safety of URNG members.
AutoNDA by SimpleDocs
SECURITY AREA. Customer agrees to furnish sufficient space for PYRO SHOWS to properly conduct the Show as determined by NFPA 1123-2014 (hereinafter "Security Area"). Customer agrees to provide adequate security protection to preclude persons unauthorized by PYRO SHOWS from entering the Security Area. For the purposes of the Agreement, "Unauthorized Persons" shall mean anyone other than the employees of PYRO SHOWS or persons specifically designated in writing by the sponsor or the Authority Having Jurisdiction (AHJ), and submitted and approved, to PYRO SHOWS prior to the event. Any expenses for security or stand-by fire protection shall be the responsibility of the Customer.
SECURITY AREA. CUSTOMER agrees to furnish sufficient space for IMPACT PYRO to properly conduct the SHOW as determined by NFPA 1123 (hereinafter referred to as SECURITY AREA). CUSTOMER agrees to provide adequate security protection to preclude unauthorized persons from entering the SECURITY
SECURITY AREA. 35.1 Notwithstanding anything to the contrary contained in this Lease, in the event that at any time during the Term Tenant shall give a Notice to Landlord designating an area of the Premises which is used by Tenant for the storage of money, securities or valuable or confidential documents as the "SECURITY AREA", then from and after the date designated in such Notice, which shall be not less than five (5) days after the date of Landlord's receipt of Tenant's Notice, except in the event of an emergency Landlord and its agents shall not exercise any right to enter the Security Area, unless Landlord is accompanied by an employee of Tenant, provided that Tenant shall make an employee available to accompany Landlord or its agents during such entry at any time during Business Hours. The location, installation and maintenance of the Security Are by Tenant shall comply with all requirements of Article 12, Insurance Requirements and Legal Requirements.
SECURITY AREA. CUSTOMER agrees to furnish sufficient space for IMPACT PYRO to properly conduct the SHOW as determined by NFPA 1123 (hereinafter referred to as SECURITY AREA). CUSTOMER agrees to provide adequate security protection to preclude unauthorized persons from entering the SECURITY AREA. For the purposes of the Agreement, “unauthorized persons” shall mean anyone other than employees of IMPACT PYRO or persons specifically designated in writing, submitted to IMPACT PYRO, and approved prior to the event. Policing of SECURITY AREA is the responsibility of the CUSTOMER.

Related to SECURITY AREA

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Security and Charge 15.1 In consideration of the Supplier agreeing to supply the Goods, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money). 15.2 The Client indemnifies the Supplier from and against all the Supplier’s costs and disbursements including legal costs on a solicitor and own client basis incurred in exercising the Supplier’s rights under this clause. 15.3 The Client irrevocably appoints the Supplier and each director of the Supplier as the Client’s true and lawful attorney/s to perform all necessary acts to give effect to the provisions of this clause 15 including, but not limited to, signing any document on the Client’s behalf.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Security Agreement under Uniform Commercial Code It is the intention of the parties hereto that this Mortgage shall constitute a Security Agreement within the meaning of Article 9 of the Uniform Commercial Code of the State of New York. Notwithstanding the filing of a financing statement covering any of the Mortgaged Property in the records normally pertaining to personal property, all of the Mortgaged Property, for all purposes and in all proceedings, legal or equitable, shall be regarded, at Mortgagees' option (to the extent permitted by law) as part of the Real Estate whether or not any such item is physically attached to the Real Estate or serial numbers are used for the better identification of certain items. The mention in any such financing statement of any of the Mortgaged Property shall never be construed as in any way derogating from or impairing this declaration and it is the hereby stated intention of the parties that such mention in protection of Mortgagee in the event any court shall at any time hold that notice of Mortgagee's priority of interest, to be effective against any third party, including the federal government and any authority or agency thereof, must be filed in the Uniform Commercial Code records. Mortgagor and Borrower hereby agree that each shall execute and hereby authorizes Mortgagee to file any financing and continuation statements which Mortgagee shall determine in its sole discretion are necessary or advisable in order to perfect it security interest in the Equipment and Personalty covered by this Mortgage, and Borrower shall pay any expenses incurred by Mortgagee in connection with the preparation, execution and filing of such statements that may be filed by Mortgagee, or, if paid by Mortgagee, such amounts, together with interest at the Default Rate, shall be added to the Indebtedness, payable on demand, and shall be secured by this Mortgage.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!