SECURITY TYPE SYSTEMS Sample Clauses

SECURITY TYPE SYSTEMS. Owner employs certain measures to protect Owner’s Facility referred to as “Security Type Systems.” The operation or failure of any type of Security Type System installed by Owner shall not change Owner’s aforementioned liability for any type of loss incurred by Occupant and shall in no way release Occupant from his/her obligation of insuring his/her Personal Property. These Security Type systems may include: □ gate codes; □ cameras; □ lighting; □ alarms; □ other (if none are checked then no Systems are presumed to exist). Occupant acknowledges that these measures are for the protection of the Owner’s Facility as a whole and not the individual Leased Space or for protection of the Occupant, that video cameras and alarms (if applicable) are not monitored at all times, and that all of these systems may not operate properly in the event of a mechanical, electrical, or software failure. Further, video cameras may not record specific events or may not record at all times and may not record all parts of the Facility.
AutoNDA by SimpleDocs
SECURITY TYPE SYSTEMS. Owner may employ certain measures to protect Owner’s Facility referred to as “Security Type Systems.” The operation or failure of any type of Security Type System installed by Owner shall not change Owner’s aforementioned liability for any type of loss incurred by Renter. These Security Type systems are door codes; cameras; lighting; and alarms. Renter acknowledges that these measures are for the protection of the Owner’s Facility as a whole and not the individual Rented Space or for protection of the Renter. While video cameras may be in use in certain areas of the facility, these cameras are video recording only (with no audio) and are not regularly monitored by Owner. Owner has no duty to notify law enforcement of any matters surveilled by said cameras. Renter is advised that there is no security guard or other staff on site, and Renter enters the facility at their own risk. Renter, as he or she determines appropriate, shall provide for their own security and safety while in the facility or on its grounds. Owner shall not be responsible for Xxxxxx’s decisions in this regard. Initial
SECURITY TYPE SYSTEMS. Operator employs certain measures to protect Operator’s Personal Property referred to as “Security Type Systems.” The operation or failure of any type of Security Type System installed by Operator shall not change Operator’s aforementioned liability for any type of loss incurred by Occupant and shall in no way release Occupant from Occupant’s obligation of insuring Occupant’s Personal Property. These Security Type Systems may include lighting, coded access gate, door alarms, fences, fence wires, sprinkler systems, and cameras - (Check with the Facility Manager for the systems available at this Facility). Occupant acknowledges that these Security Type Systems are for the protection of the Facility as a whole and not the individual Leased Space. Video cameras, if any, may not be recorded or may not be recorded at all times and any alarms are not monitored. These Security Type Systems may not operate properly in the event of a mechanical, electrical, or software failure. Cameras and other systems should not be relied on to provide additional security for the Personal Property or the Occupant, Occupant’s guests, or invitees when using the Leased Space or Facility.

Related to SECURITY TYPE SYSTEMS

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

Time is Money Join Law Insider Premium to draft better contracts faster.