Security Arrangements Sample Clauses

Security Arrangements. Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.
AutoNDA by SimpleDocs
Security Arrangements. Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.
Security Arrangements. The Employer agrees to provide appropriate, adequate facilities for the safekeeping of personal possessions of employees in such areas as deemed appropriate by the Joint Committee.
Security Arrangements. Infrastructure security of the New England Transmission System equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. The Commission expects the System Operator, Interconnecting Transmission Owners, market participants, and Interconnection Customers interconnected to the New England Transmission System to comply with the recommendations offered by the President's Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.
Security Arrangements. Requesting Carrier shall adopt, at the request of Ameritech and at Requesting Carrier's sole cost and expense, reasonable security arrangements as designated by Ameritech to separate Requesting Carrier's Collocation space from Ameritech's facilities, including the construction of a collocation cage.
Security Arrangements. The Contractor applies for access permits (Contractor’s permit) at the Security gate on the start date of the contract. The Contractor personnel shall be required to be in possession of an access permit at all times. In order to assist Protection Services with the issuing of permits and the identification of personnel on site the successful contractor is to supply a list of all personnel that he intends using on site, at least 72 hours prior to entry of the Security Area. This list must be delivered to Protection Services. The list, identified with the Contractor's name, is to contain the following information:  Employee name  Employee ID Number  The Employer’s Safety Coordinator’s signature  Copy of the ID book of every employee of the Contractor, Access permits must be returned to protection services when the worker/s leave the site, either after completion of the services, or upon earlier termination of service of a worker during the contract period. To speed up the process of gaining access to the site, the Contractor must compile detailed lists of all tools and equipment (including serial numbers where applicable) to be taken on site before arriving at the Power Station Security gate. An authorised copy of this list must be retained by the contractor - to be used again when the tools and equipment are removed from site after the completion of the services. Any additional tools or equipment brought to site, or any tools or equipment removed during the contract period must be reported to protection services and all lists amended likewise. Gate release permits will not issue for the removal of any tools or equipment not specified on the tool list. The Contractor's visitors and all personnel shall conform at all times to the security arrangements in force at the site. Application forms for visitors must be filled in by the Contractor's Site Manager and approved by the Service Manager, one day before the visit and submitted to the Employer's Protection Services office. Visitors will not be allowed on site if the necessary forms are not in the possession of the security staff. The Chief of Protection Services may, with valid cause, remove any, of the Contractor's personnel from the site, either temporarily, or permanently. He may deny access to the site to any person whom, in the opinion of the said Chief of Protection Services, constitutes a security risk. No unauthorised vehicles will be allowed on site. Only Contractor's Vehicles with displayed Contr...
Security Arrangements. The Concessionaire may make his own arrangements for security in the Project Site/Port Assets and with respect to the Project provided the Concessionaire shall abide by the security regulations/ procedures prescribed by the Concessioning Authority or a Government Authority from time to time. It shall also conform to and assist the Concessioning Authority or any authority responsible therefor in conforming to the International Ship and Port facility Security Code (“ISPS Code”) and such other codes/requirements of International Maritime Organization as may be applicable to India from time to time.
AutoNDA by SimpleDocs
Security Arrangements. The Lessee shall make arrangement for security of the Project at its cost during the entire Lease Period
Security Arrangements. Without prejudice to Section 7.2, Paynovate may require the merchant to provide any type of security or to enhance any created security deemed necessary by Paynovate to cover all claims (present, future and contingent) arising under the Merchant Agreement against the merchant, including where the amounts of future Payment Transactions are unlikely to cover anticipated Chargebacks and fees or other amounts payable by the merchant under the Merchant Agreement, as reasonably determined by Paynovate, provided that the method used to calculate Paynovate's financial exposure shall be at Paynovate's sole. Paynovate may also request the creation or enhancement of security if Chargebacks exceed a certain percentage of the total value of Payment Transactions processed in a calendar month and/or returns, as determined in the Purchase Order. In addition to the provisions of this Section and notwithstanding any insolvency proceedings, Paynovate shall have the right to set off any amount due from Merchant under this Agreement (including a Chargeback or an amount unpaid by Issuer) from an amount owed by Paynovate to the merchant under the Merchant Agreement at that time. The Merchant shall execute all documents, do all acts and perform all actions that Paynovate, acting reasonably, may require to create the security arrangements referred to in this Section of the General Conditions. All costs, including legal fees, and expenses incurred by the merchant in complying with this Section shall be borne by the merchant. The security arrangements to be provided pursuant to this Article shall survive termination of the merchant Contract and shall be enforceable until all payment obligations of the Merchant under the Merchant Agreement have been duly and fully satisfied, as notified to the merchant by Paynovate.
Security Arrangements. Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. The Public Utility and any Interconnection Customers interconnected to electric systems – when responsible entities subject to the approved reliability standards enforced by the North American Electric Reliability Corporation and the electric reliability authority – are expected to comply with applicable standards related to critical infrastructure protection. The Public Utility is expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!