SECURITY DESIGN Sample Clauses

SECURITY DESIGN. 1. Controlled access is required to the entire building and to each individual floor. If required by the Request for Proposal (RFP), Program, or State Agency Supplementary Standards, provide conduit and power for a card access management system matching the existing State of Michigan access system which is currently manufactured by Honeywell Security Products. The access system is to be capable of tracking the issuing and revocation of access cards along with generating reports of all access into the building. Provide these readers and locking/operation devices at all building entrances, loading docks, and interior doors as defined in the detailed program. 2. Central data base computer is to connect all access locations, equipped for stand‐alone operation upon power failure, programmed for automatic locking/unlocking of building doors. 3. If required by the Request for Proposal (RFP), Program, or State Agency Supplementary Standards, provide conduit and power for security cameras covering all access points. 4. Transaction windows shall have pre‐manufactured transaction window(s) with speaker port(s), pass through opening and counter. Glass shall be bullet resistant. Walls adjacent and below transaction windows shall have bullet resistant construction.
AutoNDA by SimpleDocs
SECURITY DESIGN a. Conduct a working session with TPA to identify areas of CCTV coverage and access controlled doors. b. Provide CCTV device distribution plan based on asset identification and the Threat, Risk and Vulnerability Assessment. c. Basis of design for access control and CCTV systems will be based on the expansion of the existing systems. d. Identify points of vulnerability where electronic access control should be provided. Identify points of integration for camera call ups with CCTV system.
SECURITY DESIGN a. Layout communication and power pathways and routing plan for security devices provide pathway types and sizes, cable quantities and characteristics. b. CCTV camera scope will consist of removal and re-installation of cameras in the same location where they currently are. c. Detail security riser diagrams, security rack layouts, and wall elevations. Provide detailed schedules for CCTV and ACS doors outlining all essential installation and configuration parameters. d. Provide outline division 28 specifications.
SECURITY DESIGN. 1. Controlled access is required to the entire building and to each individual floor. If required by the Project Component Checklist, provide conduit and power for a card access management system matching the existing State of Michigan access system. The access system is to be capable of tracking the issuing and revocation of access cards along with generating reports of all access into the building. Provide these readers and locking/operation devices at all building entrances, loading docks, and interior doors as defined in the detailed program. 2. Central data base computer is to connect all access locations, equipped for stand-alone operation upon power failure, programmed for automatic locking/unlocking of building doors. 3. If required by the Project Component Checklist, provide conduit and power for security cameras covering all access points. 4. Transaction windows shall have pre-manufactured transaction window(s) with a speaker ports, pass through opening and counter. Glass shall be bullet resistant. Walls adjacent and below transaction windows shall have bullet resistant construction.
SECURITY DESIGN. All Comtech supplied services and products used on the BFT network shall meet the requirements set forth in FIPS 140-2 for level 2 compliance, Army Regulation 25-2, XxXX 8500.1 and XxXX 8500.2, and the BFT System Security Authorization Agreement System Requirements Traceability Matrix. If these requirements cannot be met, a waiver must be secured from the Army. Any variance from the requirements in this paragraph must be approved in writing by the Government prior to use on the BFT network. As software and hardware products and security functionality are updated, the Contractor shall adapt the design of the FBCB2 BFT functions to meet security requirements. The FBCB2 BFT system will operate as a Mission Assurance Category (MAC) Level I, as described in XxXX 8500.1, and will meet the IA requirements for the protection of information at this level. Contractor personnel performing IT Position Category duties as defined in AR 25-2 and applicable to unclassified DoD information systems, must meet the investigative and assignment requirements IAW AR 25-2 and AR 380-67. An IT Position Category Designator indicates the level of IT access required to execute the responsibilities of the position based on the potential for an individual assigned to the position to adversely impact DoD missions or functions. Position categories include: IT-I (Privileged), IT-II (Limited Privileged) and IT-III (Non-Privileged). Investigative requirements for each category are defined in Paragraph 4-14a, AR 25-2 (Reference 2). IT Postion Management is the responsibility of the contractor. The contractor maintains administrative accounting and control of all CMS FBCB2 BFT authorized IT Positions. A by-name listing of personnel assigned to IT Level positions will be used to maintain accountability of assignment to IT-sensitive positions. Upon assignment to a position, the appropriate investigation will be initiated. An individual will not be allowed to work in an IT-sensitive until the investigative requirements are met. If the appropriate investigative requirements cannot be favorably adjudicated, the individual will not be assigned to the IT-sensitive position. The government’s authorized representatives will request review of these positions to ensure compliance. Classified information / material will be protected IAW the Department of Defense, 5220.22-M, National Industrial Security Program - Operating Manual (NISPOM). Security Requirements will be specified in the Contract Security C...
SECURITY DESIGN. Sprint will work with Customer to create a Security Engineering Design Document ("SEDD") for each security device within the network, describing the configuration and accompanying service levels that meet Customer's established security policy. This design is developed to minimize Customer's risks associated with threats and vulnerabilities. Sprint reserves the right to modify the SEDD in response to additional information on Customer's needs.
SECURITY DESIGN. The Company agrees to confer with the Client regarding the implementation of hardware and software firewalls and other security concerns. No provisions for the security of the Client Web Server outside of this agreement are expressed or implied.
AutoNDA by SimpleDocs
SECURITY DESIGN. This design outlines how security is implemented both physically and logically within the facilities. Performance. Design considerations that may impact performance, to include availability, response time, throughput, transaction volumes, problem complexity, and peak load. Additional Considerations. A description of any other characteristics of the design. CONTRACTOR shall develop and document all necessary workflows, processes and procedures to accomplish Print Services during implementation. The workflows, processes and procedures shall be comprehensively documented in a standard format in the Print Services Maintenance and Operations Plan. Design and Development activities will continue until the new Print Services are operational for all designated Counties.
SECURITY DESIGN. CTI Consulting, as a subconsultant to Xxxxxx, will be responsible for providing security design for the existing security system for the terminal. Design will include: • Static and PTZ cameras • BIO readers • Access controlStorage capacity • Cloud-based storage • System softwareCommunication Infrastructure

Related to SECURITY DESIGN

  • Program Design The County Human Resources Department will operate a Catastrophic Leave Bank which is designed to assist any County employee who has exhausted all paid accruals due to a serious or catastrophic illness, injury, or condition of the employee or family member. The program establishes and maintains a Countywide bank wherein any employee who wishes to contribute may authorize that a portion of his/her accrued vacation, compensatory time, holiday compensatory time or floating holiday be deducted from those account(s) and credited to the Catastrophic Leave Bank. Employees may donate hours either to a specific eligible employee or to the bank. Upon approval, credits from the Catastrophic Leave Bank may be transferred to a requesting employee's sick leave account so that employee may remain in paid status for a longer period of time, thus partially ameliorating the financial impact of the illness, injury, or condition. Catastrophic illness or injury is defined as a critical medical condition, a long-term major physical impairment or disability which manifests itself during employment.

  • UNCOVERING OF WORK 13.1.1 If any portion of the Work should be covered contrary to the request of the Architect or to requirements specifically expressed in the Contract Documents, it must, if required in writing by the Architect, be uncovered for his or her observation and shall be replaced at the Contractor's expense. 13.1.2 If any other portion of the Work has been covered which the Architect has not specifically requested to observe prior to being covered, the Architect may request to see such Work and it shall be uncovered by the Contractor. If such Work is found in accordance with the Contract Documents, the cost of uncovering and replacement shall, by appropriate Change Order, be charged to the State. If such Work is found not to be in accordance with the Contract Documents, the Contractor shall pay such costs unless it is found that this condition was caused by the State or a separate contractor as provided in Article 6 of these General Conditions, in which event the State shall be responsible for the payment of such costs.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!