Space Security Sample Clauses

Space Security. The Parties shall promote the enhancement of safety, security and sustainability of all space-related activities, and agree to work together at bilateral, regional and international levels with the aim of safeguarding peaceful uses of outer space. Both Parties note the importance of preventing an arms race in outer space.
AutoNDA by SimpleDocs
Space Security. In order to provide adequate security and protection of personnel, property and equipment, all areas will be provided with adequate locks and patrolled by campus security personnel. Members shall be provided keys to work areas and to the buildings containing those work areas, in accordance with local campus policy as proposed by the Senate and approved by the President. Part-time members shall be provided with secure storage for course materials that require confidentiality.10 10 The implementation of this provision shall be the subject of letters of agreement negotiated at each of the four universities, following the same procedures as specified in Article 10.4 of this Agreement.
Space Security. Security shall be standard industrial type key and lock assembly and the exterior of the building will be monitored by video recording equipment operated and maintained by Lincoln Transportation and Utilities. Any additional electronic security devices or monitoring systems will be the responsibility of County.
Space Security. Definitions Space may be defined as an unlimited three-dimensional expanse in which all material objects are located. In this context it is the place beyond our planet’s atmosphere taking place between the celestial bodies of the universe. The density is normally negligible although cosmic rays, meteorites, gas clouds, etc., can occur. It can be divided into cislunar space (between the earth and moon), interplanetary space, interstellar space, and intergalactic space. Considering the humankind state-of- the-art of technology development, the space relevant to be considered concerning threat may be constrained to cislunar space, however also more projects discovering space beyond this limit are carried out. The involvement of space in espionage, security and commercial related themes increases the requirement of security-related definitions and actions. Thus Space security may be defined as the secure and sustainable access to, and use of, space and freedom from space-based threats. Security of aerospace missions: Because of the multiple use of space and wide range of space actors, a comprehensive and holistic outlook is necessary to achieve a reasonable understanding of space security and security of aerospace missions. The protection of communication links to and between satellites as well as to other aerospace missions is a major concern next to the protection of vulnerable space ground stations. Protection of space missions and satellites against some direct threats which lead to destruction is a high concern for ground stations but also for space missions, which however require sophisticated technology for an attack. Strategies for avoidance of large damage are mainly obtained through radiation hardening, system redundancy, and greater use of higher orbits. Additionally space systems may offer important support for military functions such as: communications, navigation, early- warning, reconnaissance, surveillance, imaging, and remote-sensing. In this context these systems could allow the realization of operations with speed, precision, and economy of force. Satellite security: The number of satellites and other objects in earth orbit has been continuously growing and because of its high speed in orbit, space debris can endanger space assets. In addition, satellites require an orbital slot and a portion of the radio frequency spectrum in order to effectively carry out their functions in orbit and ensure communication. The expansion of satellite applica...
Space Security. Security shall be standard industrial type key and lock assembly and includes one monitoring device outside the exterior door. In an effort to prevent vandalism and damage to the property, additional monitoring devices may be installed in the common areas, exterior, and garage areas. The devices are used for the limited purpose of monitoring the conduct of persons who may cause such damage and destruction. Such monitoring devices will not be monitored 24 hours a day. LTU shall not be responsible for the quality of any such security system which may be provided hereunder or for damage or injury to Tenant, its employees, invitees or others due to the failure, action or inaction of such security system.

Related to Space Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA. EXHIBIT E

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Performance Security If our Tender is accepted, we commit to obtain a performance security in accordance with the Tendering document;

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • Premises Security 10.1 Security of premises and control of access.

Time is Money Join Law Insider Premium to draft better contracts faster.