Security Vetting Sample Clauses

Security Vetting. 13.3.1 The Supplier shall undertake Baseline Personnel Security Standard (BPSS) pre-employment checks, as stated in the HMG Personnel Security Controls, for all Supplier Personnel that have access to Network Rail premises or Network Rail IT networks. 13.3.2 Under the National Railways Security Programme (NRSP) some Supplier Personnel will be required to complete additional security checks as outlined in HMG Personnel Security Controls. This applies to Critical National Infrastructure (CNI) sites and Managed Stations and those with access to CNI systems and information on sensitive train movements. Network Rail’s Representative may designate other roles requiring these additional checks. 13.3.3 The Supplier shall prevent Supplier Personnel who are unable to obtain the required security clearances from accessing Network Rail premises and Network Rail IT networks. 13.3.4 Under NRSP all Supplier Personnel are required to undergo biennial security training. These training records shall be kept for five years and be available on request. The training material will be provided by Network Rail through e- learning at no additional cost to the Supplier.
AutoNDA by SimpleDocs
Security Vetting. NUS shall within one (1) week of execution of this Project Agreement submit to DSO for security vetting, the names and particulars such as National Registration Identity card and previous security clearance reference, of all personnel, including the personnel of its sub-contractor who will be involved in the performance of the Project in this Project Agreement.
Security Vetting the Supplier shall undertake Baseline Personnel Security Standard pre- employment checks, as stated in the HMG Personnel Security Controls, for all Supplier Personnel that have access to Network Rail Premises or Network Rail IT networks;
Security Vetting. We have extensive experience of bringing linguists up to the required levels of security across a number of areas. In the NHS setting all our interpreters are CRB checked, for the CJS work all interpreters are enhanced CRB checked and then vetted and in the private sector we have linguists that are SS and other security clearance for sensitive defence work. We therefore have a range of experience of bringing linguists up to the security standard required by different organisations.
Security Vetting. 20.3.1 The Service Provider is responsible for the ensuring that all their employees and any sub-contractors, agents etc. who are due to work at the Premises, for longer than four weeks in duration in the delivery of the Contract, whether in a continuous period, or over the duration of the Contract, have been security vetted to Basic level, as defined by Disclosure Scotland1. 1 Please note that Disclosure Scotland is the agency that all security vetting providers will approach to undertake the security vetting.
Security Vetting. 16.1 The PROJECT MANAGER is responsible for the ensuring that all their employees and any sub-contractors, agents etc. who are due to work at the Premises, for longer than four weeks in duration in the delivery of the Contract, whether in a continuous period, or over the duration of the Contract, have been security vetted to Basic level, as defined by Disclosure Scotland1. 1 Please note that Disclosure Scotland is the agency that all security vetting providers will approach to undertake the security vetting. 16.2 For companies with a small employee base, IWM will be prepared to undertake the security clearance on behalf of the company, provided that this is made known at the time of the appointment, and that this agreed by IWM, and that the company agrees to pay the administration charge of £41 per clearance, that IWM is charged for this service. 16.3 This requirement will apply to an employee who has not worked at an IWM branch, within the previous 12 months. 16.4 A minimum of 48 hours before any individual commences work on the Premises, the PROJECT MANAGER is required to complete and submit the Security Notification Form (see Appendix 2) to the Technical Security Manager at IWM London. 16.5 Upon arrival at the Premises, each new employee must report individually to the Control Room with a copy of their certificate of proof of vetting, and some form of ID. IWM will note the details of the certificate of proof of vetting, but will not retain any documents. 16.6 IWM will accept a certificate of proof of vetting which is dated within 12 months of the date of their site commencement at IWM, although IWM reserves the right to request they are security vetted, at its discretion, which IWM agrees not to action unreasonably. 16.7 Failure to comply with this requirement could result In the employee not being granted access to IWM.
Security Vetting. Selected candidates for employment at the WB3C shall be required to submit to security vetting by the competent authorities of the Founding Members. Such security vetting shall be conducted in accordance with the internal legislation of the Founding Members. VII. FINAL PROVISIONS Article 17
AutoNDA by SimpleDocs

Related to Security Vetting

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Safeguards Contractor shall maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of District Data. Contractor shall store and process District Data in accordance with industry standards and best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in CIS Critical Security Controls (CIS Controls), as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation the Act, as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended, or such other standard as the District’s Chief Privacy Officer or designee may agree to in writing. Contractor shall also encrypt any backup, backup media, removable media, tape, or other copies. In addition, Contractor shall fully encrypt disks and storage for all laptops and mobile devices.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!