Security Control. The Passenger must submit to all security controls as required by the official government or airport authorities or at THE CARRIER’s request.
Security Control. Tenant is responsible for providing its contractor’s access to the Premises. The Tenant is fully responsible for the physical security of the leased premises and the contents therein throughout the construction period.
Security Control. 7.1.1. Before each use of the vehicle, the user must ensure the basic safety controls considered in this article: (I) the durability of the tires; (II) safe operation of all brakes and lights; and (III) the appropriate load carrying capacity of the scooter; (IV) sufficient battery level and (V) any signs of damage, unusual or excessive depreciation or other mechanical problems that can be clearly seen.
Security Control. Plant safety operation monitoring.
Security Control. I am obligated to protect CUI to which I am granted access from unauthorized disclosure, in accordance with the terms of this agreement under Tutor Perini Corporation guidance with regard to any "view only" CUI to which I am granted access. I agree not to screen print or take photographs or use other imaging efforts to capture the data represented in the“view only” display.
Security Control. Tenant agrees to control, at its expense, all Persons and vehicles entering any Axxxxxx xxxxxxxxxx xxxx (xxxxxxxxx xxxxxxxx xxxxxxxx xxxx) through its leased space in accordance with the Memphis International Airport Security Program in compliance with 49 C.F.R. Parts 1520, 1540 and 1542, and any other applicable federal laws now or hereafter in effect.
Security Control. Where a security vulnerability affecting any products or services supplied under the Agreement is identified, the Parties shall cooperate in good faith and shall use their best endeavors to mitigate the security risks so identified and any risks of unlawful or unauthorized disclosure of Personal Data. If Huawei and/or its Affiliates is subject to enforcement action by an enforcement or governmental agency in the Business Area or elsewhere, or End Users' or other data subject's claims for compensation, you undertake to be solely responsible for eliminating the adverse impact on Huawei and/or its Affiliates, and you shall indemnify and hold harmless Huawei and/or its Affiliates for any and all economic losses including fines/penalties and any End User compensation (including refunds) mandated and ordered by law. In addition, Huawei shall be entitled to terminate this Agreement immediately upon written notice for any material breach by you.
Security Control. Internal and external vulnerability scanning is regularly conducted by authorized administrators as well as external specialists to help detect and resolve potential system security exposures. Anti-virus detection systems are in place throughout all Plesk servers, client devices and offices.
Security Control. For the security and control mechanisms required from a service provider, the participants chose user authentication control, backup and confidentiality as the most important aspects. The list of answers from Fig. 17 is reproduced here for better readability:
1. User authentication control
2. Backup
3. Confidentiality
4. User Rights (authorization)
5. Integrity
6. Threat detection
7. Logs and audit trails
8. User authentication integration with current organization identity management system
9. Workload and data isolation
Security Control. When the Equipment has been installed according to this Agreement, the Supplier shall ensure that a Security Control is carried out together with SLL, with the assistance of an authorized inspector, according to the Time Schedule in order to control that the security, function and capacity of the installed Equipment complies with the conditions of this Agreement. A Security Control shall include
(i) any tests, scrutiny and testing that SLL deems adequate for this purpose (including tests with relevant media such as gas) and which in all essence complies with the standards generally applied within the industry and (ii) control of the technical documentation supplied by the Supplier. In due time before the Final Inspection, SLL shall produce minutes from the Security Control which – unless the contrary is shown –shall be deemed to correctly account for the execution and results of the Security Control. Unless otherwise agreed between the Parties, SLL shall bear the entire cost for the independent inspector.