Tool Security Sample Clauses

Tool Security. Gardeners may not make duplicate keys of any locks on the premises, or give out the key or lock combinations to any other person. Keys must be returned to the Garden Manager on or before November 30, 2013.
AutoNDA by SimpleDocs
Tool Security. Employer shall endeavor to provide a secure area for the employees to place their personal tools during non-working hours. Discussions to accomplish this goal will be held at the work site or at agency level labor/management meetings.
Tool Security. Gardeners may not make duplicate keys of any locks on the premises, or give out the key or lock combinations to any other person.
Tool Security. The Employer shall make best reasonable effort to provide an adequate number of locking tool cages or other reasonably secure means at the job site during the workday (and overnight storage) of employee’s required personal tools. Garments and other personal belongings shall be removed by the employee daily. All tool, garment and personal belonging storage shall be at the employee’s own risk.
Tool Security. The tool box is not locked, but if tool security becomes a problem, we will add a combination lock. Gardeners may not give out the lock combinations to any other person.

Related to Tool Security

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks;

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • NATIONAL SECURITY Nothing in this Agreement shall be construed:

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • Essential Security Nothing in this Chapter shall be construed to: (a) require a Party to furnish or allow access to any information, the disclosure of which determines to be contrary to its essential security interests; or (b) preclude a Party from applying measures that it considers necessary for the fulfillment of its obligations under United Nation Charter for the maintenance or restoration of international peace or security, or the protection of its own essential security interests (19).

Time is Money Join Law Insider Premium to draft better contracts faster.