Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
Security Clearance 6.7.1 Where specified by the Authority or the Contract user, the Supplier shall be responsible for ensuring that all Staff are security cleared to the level required by the Security Requirements not less than 5 Working Days before such person begins to perform the Services. If the Authority is responsible for applying for security clearance for Staff pursuant to this Clause 6.7.1, the Supplier shall provide a completed security clearance application form for such members of Staff to the Authority not less than 30 days before such members of Staff begin to perform the Services. 6.7.2 The Authority shall issue a pass for all Staff who are security cleared to an appropriate level for the Premises in accordance with Clause 6.7.1 on or before the date when such member of Staff is required to enter onto the Premises in Order to perform the Services. Passes shall remain the property of the Authority and shall be surrendered on demand or on termination or expiry of this Contract. 6.7.3 A member of Staff not in possession of a pass who is required by the Supplier or any Sub-contractor to provide the services urgently shall be allowed temporary access to the Premises on condition that the Supplier ensures, or procures that any Sub- contractor shall ensure, that such individual is accompanied at all times while on the Premises by a member of Staff who has been issued with a pass in accordance with Clause 6.7.1. 6.7.4 Without prejudice to the provisions of Clauses 6.7.1 to 6.7.3 inclusive, the Authority may refuse any member of Staff Admission to the Premises or require the removal of any member of Staff from the Premises in accordance with Clause 3.3 if such member of Staff is not in possession of a pass pursuant to Clause 6.7.2 or accompanied in accordance with Clause 6.7.3.
Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.
Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.
Credit Card If you choose to pay by credit card, you will be prompted to provide your credit card information and will be presented with a screen that reflects the amount of your subscription, the amount of fees that would be charged by the credit card issuer for the transaction and the total amount payable.
Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Security Clearances A. The General Contractor is to supply the Court with names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted one (1) week prior to access to the site. The Court has final word on who will or who will not be allowed on the project premises.
Debit Card If approved, you may use your Visa® card to purchase goods and services from participating merchants. However, you may not use your card to initiate any type of gambling transaction. If you wish to pay for goods or services over the Internet, you may be required to provide card number security information before you will be permitted to complete the transaction. You agree that you will not use your card for any transaction that is illegal under applicable federal, state, or local law. Funds to cover your card purchases will be deducted from your share draft account. For ATM and one-time debit card transactions, you must consent to the Credit Union’s overdraft protection plan in order for the transaction amount to be covered under the plan. Without your consent, the Credit Union may not authorize and pay an overdraft resulting from these types of transactions. Services and fees for overdrafts are shown in the document the Credit Union uses to capture the member’s opt-in choice for overdraft protection and the Schedule of Fees and Charges.
Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.
NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.