Security procedures on the Operator's premises Sample Clauses

Security procedures on the Operator's premises. 12.1. This section applies only if the Operator is realizing a computer system or parts of one under this agreement for the Airports Authority. The following are requirements for handling information on the Operator's premises. All of the below applies both to the Operator and to their subcontractors. 12.2. The Operator expressly undertakes to meet all of the following requirements: 12.2.1. The teleprocessing array, on which the services will be carried out on the Operator’s premises, shall be disconnected from the company's computer network. Alternately, if the Operator proves, to the satisfaction of the Authority's representative, that the security measures they employ or will employ guarantee the absolute isolation of the Authority's information from the Operator’s computer network or from any information from some other company the Operator provided service to, they shall be entitled to operate accordingly. 12.2.2. Only personnel authorized by the Authority shall be allowed access to the Authority’s data. 12.2.3. Access to Authority information on the Operator's computers: 12.2.4. The Operator shall activate mechanisms for data protection and for preventing unauthorized access to Authority information. If the identification and verification mechanism is password-based, the bidder must undertake to implement the action according to the requirements for the highest level of security in the Israel Standards Institute passwords standard. The bidder must present the mechanisms they intend to employ. 12.2.5. The Operator shall operate a security and control mechanism for the Operator's user activity in the system and receive the Authority representative's approval for this array. The bidder must present the mechanisms they intend to employ. 12.2.6. Diagnostic and repair actions (for both hardware and software) required so long as Authority data is stored on disks in the bidder’s or Operator's IT system, shall be carried out on the Operator’s premises with no offsite communications and with no use of offsite control programs for this purpose. Maintenance actions shall only be carried out by elements receiving approval from the Authority's representatives. The bidder must prepare for this in advance. 12.2.7. Data-bearing media, on which Authority data will be backed up, shall be saved in a locked safe. The safe keys shall only be held by authorized parties with the Authority’s security clearance, set for this purpose. Such an authorized party may not be replac...
AutoNDA by SimpleDocs

Related to Security procedures on the Operator's premises

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • PREVAILING WAGE RATES - PUBLIC WORKS AND BUILDING SERVICES CONTRACTS If any portion of work being Bid is subject to the prevailing wage rate provisions of the Labor Law, the following shall apply:

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Construction Phase Services 3.1.1 – Basic Construction Services

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.

  • Interconnection Facilities Engineering Procurement and Construction Interconnection Facilities, Network Upgrades, and Distribution Upgrades shall be studied, designed, and constructed pursuant to Good Utility Practice. Such studies, design and construction shall be based on the assumed accuracy and completeness of all technical information received by the Participating TO and the CAISO from the Interconnection Customer associated with interconnecting the Large Generating Facility.

  • Professional Improvement Leave A teacher may be granted leave to be used for the teacher's professional improvement. Professional improvement days may be approved by the superintendent and used for the purpose of: 1. Visitation to view other instructional techniques or programs. 2. Conferences, workshops, or seminars conducted by colleges, universities, or vocational schools. The teacher planning to use a professional improvement day shall notify the principal at least one week in advance of the proposed absence. The teacher shall be required to file a written report with the principal within one (1) week of attendance at such event. Also, the teacher may/shall be requested to return with materials and/or information to be shared with other teachers. The expense of attending such visitation, conference, workshop, or seminar will be paid by the Board when the proper reimbursement applications are sent to the district office. In cases where attendance at a convention, workshop, seminar, or other educational activity is deemed to be of value only to the individual teacher, leave may be granted for attendance with either no expenses or limited expenses being underwritten by the district. In these cases, no written or verbal reports will be required.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Maintaining Records; Access to Properties and Inspections Maintain financial records in accordance with GAAP and, upon reasonable notice, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of the Borrower or any Significant Subsidiary during normal business hours and to discuss the affairs, finances and condition of the Borrower or any Significant Subsidiary with the officers thereof and independent accountants therefor.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!