Security Consideration Sample Clauses

Security Consideration. The Agency agrees to make reasonable efforts to provide security for the protection of employees and their personal property in the work areas. Once the Agency deems it necessary to evacuate from any work location, the Agency must determine the location is safe before instructing the employees to return to work in that area. Employees shall not be asked or required to enter an evacuated area prior to the time the location has been determined to be safe, unless the employee's work duties require work in such circumstances.
AutoNDA by SimpleDocs
Security Consideration. As mentioned in Introduction, we compare those admired security criteria with the previous schemes [24, 25] and show the result in Table 1.
Security Consideration. 1.10.1 Individuals/Groups/Organisations are permitted to use as customer encryption up to 40 bit key length in the RSA algorithms or its equivalent in other algorithms without having to obtain permission. However, if encryption equipments higher than this limit are to be deployed, individuals/groups/organisations shall do so with the permission of the Telecom Authority and deposit the decryption key, split into two parts, with the Telecom Authority. 1.10.2 The LICENSEE shall provide to the LICENSOR, location details of the equipment provided by ISP. Implementation of any installation of the concerned equipment and execution of the concerned project shall be taken up only after the approval by the LICENSOR and locations of these centres shall not be changed without prior approval of the LICENSOR. This requirement shall be applicable only to such areas as are sensitive from security point of view, as may be notified from time to time by the LICENSOR. In the interest of national security, the ISPs shall block Internet sites and/or individual subscribers, as identified and directed by the Telecom Authority from time to time. 1.10.3 Each ISP must maintain a log of all users connected and the service they are using (mail, telnet, http etc.
Security Consideration. Exhibit B lists the Company Common Stock, Company Series A Preferred Stock, Company Warrants, Company Options and the PHL Note (collectively, the “Company Securities”) outstanding or issuable on the date of this Agreement, the Securityholders who own or have a right to receive the Company Securities and the percentage of the Merger Consideration to be received by each Securityholder. The aggregate consideration to be received by the Securityholders in connection with the Merger shall be the following, subject to reduction in accordance with Sections 2.6(b) and 2.8 (collectively, the “Merger Consideration”): (i) Preferred Stock Consideration. 4,125.79 shares of Series G Convertible Preferred Stock, no par value per share (“Parent Preferred Stock”) of Parent (the “Preferred Stock Consideration”).
Security Consideration. 2-01 SCREENING All personnel employed by Contractor to perform Services hereunder shall be screened as to their background and previous work records to insure that only persons of integrity will be employed by Contractor. At the sole discretion of Manager, such screening may include fingerprinting for an FBI file check to assure that the employee has not been convicted of any criminal offense involving dishonesty or breach of trust. Contractor shall, upon request, promptly furnish Manager with copies of personnel records of any employee, servant or agent of Contractor who is employed by Contractor pursuant to this agreement. 2-02 BONDING All employees of Contractor that are assigned to the premises shall be bonded by an insurance company rated A+ AAA in “Best’s Insurance Guide”. Contractor shall furnish to Manager, as part of this agreement, a certificate of a Commercial Blanket Bond or equivalent for $500,000 per event. Such bond shall cover losses suffered by Manager, Owner and Tenants as well as losses of money or personal property taken or damaged by Contractor personnel from or on the premises. 2-03 IDENTIFICATION All Contractor personnel shall at all times be properly uniformed, as satisfactory to Manager, and display identification of the individual and either Contractor, Manager, Project or Building, as determined by Manager. Contractor shall furnish uniforms in sufficient quantity for personnel to maintain a neat, orderly and professional appearance while on the premises. At Manager’s discretion, all Contractor personnel shall be photographed and provided with an identification badge which shall be worn with photograph visible at all times while on the premises. Identification badges shall remain Manager’s property and shall be surrendered to Manager immediately upon discharge or transfer of personnel from the premises or termination of this agreement. 2-04 LOITERING/SOLICITATION Contractor personnel shall not loiter on or about the premises during unscheduled hours and shall not solicit “odd jobs”, extra work or, in any manner, harass or annoy tenants of the premises.
Security Consideration. Here we show that our protocol fulfils the recurred security aspects keeping the fact in mind that above discussed problems are secure.
Security Consideration. As mentioned in Introduction, we compare those admired security criteria with the previous schemes [24, 25] and show the result in Table 1. Table 1: Comparisons of satisfaction of the security cri- teria hard for A to derive the point QIDA from RA2 without
AutoNDA by SimpleDocs
Security Consideration. 1.10.1 Individuals or groups of organisations both in private and Government sectors are permitted to deploy, indigenous or imported, encryption equipments for providing secrecy in transmission up to a level of encryption to be specified by Telecom Authority. However, if encryption equipments of levels higher than specified are to be deployed, individuals/groups/organisations shall obtain clearance from the Government of India and shall deposit one set of keys with the Telecom Authority. 1.10.2 The LICENSEE shall provide to the LICENSOR, location details of the equipment provided by ISP. Implementation of any installation of the concerned equipment and execution of the concerned project shall be taken up only after the approval by the LICENSOR and locations of these centres shall not be changed without prior approval of the LICENSOR. This requirement shall be applicable only to such areas as are sensitive from security point of view, as may be notified from time to time by the LICENSOR. 1.10.3 Each ISP must maintain a log of all users connected and the service they are using (mail, telnet, http etc.
Security Consideration. 1.10.1 Individuals / Groups/ Organisations are permitted to use as customer encryption upto 40 bit key length in the RSA algorithms or its equivalent in other algorithms without having to obtain permission. However, if encryption equipments higher than this limit are to be deployed, individuals/groups/organisations shall do so with the permission of the Telecom Authority and deposit the decryption key, split into two parts, with the Telecom Authority.. 1.10.2 The LICENSEE shall provide to the LICENSOR, location details of the equipment provided by ISP. Implementation of any installation of the concerned equipment and execution of the concerned project shall be taken up only after the approval by the LICENSOR and locations of these centres shall not be changed without prior approval of the LICENSOR. This requirement shall be applicable only to such areas as are sensitive from security point of view, as may be notified from time to time by the LICENSOR. In the interest of national security, the ISPs shall block Internet sites and / or individual subscribers, as identified and directed by the Telecom Authority from time to time. 1.10.3 Each ISP must maintain a log of all users connected and the service they are using (mail, telnet, http etc.). The ISPs must also log every outward login or telnet through their computers. These logs, as well as copies of all the packets originating from the Customer Premises Equipment (CPE) of the ISP, must be available in REAL TIME to Telecom Authority. Type of logins, where the identity of the logged-in user is not known, should not be permitted. 1.10.4 The LICENSEE shall provide necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity. The said facilities to be provided by the LICENSEE will depend upon the specific situation at the relevant time. Type and extent of facility(ies) required shall be at the sole discretion of the Government of India. 1.10.5 The LICENSEE shall not use any hardware/software which are identified as unlawful and/or render network security vulnerable. The LICENSEE shall make available , on demand, to the agencies authorised by the Government of India, full access to the equipment provided by the ISP for technical scrutiny and detailed inspection. 1.10.6 All foreign personnel likely to be deployed by the LICENSEE for installation, operation and maintenance of the LICENSEE’s network shall be required to obtain security clearance by the Gove...
Security Consideration. Screening: All personnel employed by Contractor to perform services hereunder shall be pre-screened as to their background and previous work records to ensure that only persons of integrity will be employed by Contractor. The awarded Contractor will incur the cost of the background checks for the contractors and their employees. In addition, Contractor shall be responsible for reviewing with all contractors’ employees as specified in the “Instructions to All Contractors and Contractors Employees”, Exhibit 2: Orangewood Children and Family Center Security Clearance.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!