Security of the Strong Room/Vault Sample Clauses

Security of the Strong Room/Vault. Necessary steps to ensure that the area in which the locker facility is housed is properly secured to prevent criminal break-ins. The risks of accessibility of an allotted locker from any side without involvement of the locker-hirer concerned may be assessed and kept on record. There shall have a single defined point of entry and exit to the locker room/vault. The place where the lockers are housed must be secured enough to protect against hazard of rain / flood water entering and damaging the lockers in contingent situations. The fire hazard risks of the area should also be assessed and minimized. Regular necessary engineering / safety verification shall conduct to identify the risk and carry out necessary rectification. The area housing the lockers should remain adequately guarded at all times. Access Control System may be installed, if required as per their risk assessment, which would restrict any unauthorized entry and create digital record of access to locker room with time log. The entry and exit of the strong room and the common areas of operation under CCTV camera and preserve its recording for a period of not less than 180 days. In case any customer has complained to the branch that his/her locker is opened without his/her knowledge and authority, or any theft or security breach is noticed/observed, the branch shall preserve the CCTV recording till the police investigation is completed and the dispute is settled. The staff concerned shall be properly trained in the security procedure. The internal auditors shall verify and report the compliance to ensure that the procedures are strictly adhered to.
AutoNDA by SimpleDocs
Security of the Strong Room/Vault. 3.1.1 Banks shall take necessary steps to ensure that the area in which the locker facility is housed is properly secured to prevent criminal break-ins. The risks of accessibility of an allotted locker from any side without involvement of the locker-hirer concerned may be assessed and kept on record. Banks shall have a single defined point of entry and exit to the locker room/vault. The place where the lockers are housed must be secured enough to protect against hazard of rain / flood water entering and damaging the lockers in contingent situations. The fire hazard risks of the area should also be assessed and minimized. The banks, as per their policy, shall conduct necessary engineering / safety verification regularly to identify the risks and carry out necessary rectification.

Related to Security of the Strong Room/Vault

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule 2 DELIVERABLES AND COMPLETION DATE The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Security of Data a. Each of the parties shall:

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

Time is Money Join Law Insider Premium to draft better contracts faster.