Access and Security definition

Access and Security. Agreement shall mean the Access and Security Agreement dated as of January 1, 2001, between Harvard, and Pottstown, on the one hand, and General Motors Corporation, on the other hand, and each of the three Access and Security Agreements dated as of the same date between Harvard and Xxxxx-Albion, on the one hand, and General Motors Corporation, on the other hand, relating to the Xxxxx-Albion facility in Jackson, Michigan, the Trim-Trend facility in Bryan, Ohio, and the Trim-Trend facility in Spencerville, Ohio.
Access and Security. Agreement shall mean the Access and Security Agreement dated as of January 1, 2001, between Harvard and Pottstown, on the one hand, and General Motors Corporation, on the other hand, each of the three Access and Security Agreements dated as of the same date between Harvard and Xxxxx-Albion, on the one hand, and General Motors Corporation, on the other hand, relating to the Xxxxx-Albion facility in Jackson, Michigan, the Trim-Trends facility in Bryan, Ohio, and the Trim-Trends facility in Spencerville, Ohio, and the Access and Security Agreement referred to in the Visteon/American Axle Participating Customer Agreement and each other access and security or similar agreement with other Participating Customers of any Borrower facility entered into with the prior written consent of the Lenders and the Junior Lien Lender in connection with a Participating Customer Agreement with such customer.
Access and Security above, as well as the requirements relating to security, traffic and parking in the public domain premises of SNCF RÉSEAU, described in the Special Conditions, shall be the liability of the BENEFICIARY who consequently waives all recourse against SNCF RÉSEAU, its respective agents and its possible insurers. He undertakes to indemnify them and to guarantee them against any action that may be brought against them.

Examples of Access and Security in a sentence

  • TRADE COMMISSION (May 2000), https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-fair-information- practices-electronic-marketplace-federal-trade-commission-report/privacy2000.pdf (describing ‘the four widely-accepted fair information practices’ of Notice, Choice, Access and Security).

  • Partnership for Energy Access and Security – India and South Asia,” accessed 5 July 2020,https://www.usaid.gov/.

  • Clearance, Access, and Security Requirements shall be in accordance with Section 11.0 of the Contract.

  • Figure 6: Summary of the challenges and solutions identified for the cross-cutting theme of Access and Security and its sub-themes of access to populations, access to health facilities and violence against healthcare workers.

  • Section 8.0 Technical Access and Security The following questions are intended to describe technical safeguards and security measures.

  • Base Access and Security Requirements: An offeror shall explain how it will comply with base access security requirements at Subhan Military Complex in Kuwait.The narrative shall also describe the offeror's plan to control access to the work site and for obtaining base access and security requirements for its personnel, subcontractors, and its construction materials and equipment.

  • Access and Security The VaccineFinder provider portal is being developed and maintained by Boston Children’s Hospital HealthMap in partnership with CDC and Castlight.

  • Laboratory departments are organized and the facilities are designed for specific laboratory operations in order to protect the safety of analysts and to minimize potential sources of contamination between and within department areas (for more information, see ELI SOP, Facility Description, Access, and Security).

  • HUD Building Access and Security 33 a) Weaver Building Access and Security Plan 33 8.

  • All technological systems such as audio/visual systems, speaker systems, internet access, Local Area Networks (LAN) / Wide-Area Networks (WAN) / Wireless Fidelity (WI-FI), Voice-over Internet Protocol (VoIP) and Access and Security system shall be major components of the design.

Related to Access and Security

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Privacy and Security Laws means any and all international, local, country-specific, or U.S. State or Federal laws, regulations, directives, standards, guidelines, policies, or procedures, as amended, applicable to Supplier pertaining to the security, confidentiality, or privacy of Buyer Data.

  • Loan and Security Agreement “thereunder”, “thereof” or similar words referring to the Loan Agreement shall mean and be a reference to this Agreement and (b) each reference in the Financing Agreements to a “Note” or “Revolving Credit Note” shall mean and be a Revolving Credit Note as defined in this Agreement.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Guaranty and Security Agreement means a guaranty and security agreement, dated as of even date with this Agreement, in form and substance reasonably satisfactory to Agent, executed and delivered by each of the Loan Parties to Agent.

  • Pledge and Security Agreement means the Pledge and Security Agreement to be executed by Company and each Guarantor substantially in the form of Exhibit I, as it may be amended, supplemented or otherwise modified from time to time.

  • Loaned Security means any “security” which is delivered as a Loan under a Securities Loan Agreement; provided that, if any new or different security shall be exchanged for any Loaned Security by recapitalization, merger, consolidation, or other corporate action, such new or different security shall, effective upon such exchange, be deemed to become a Loaned Security in substitution for the former Loaned Security for which such exchange was made.

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Permitted Security means any Security:

  • Guarantee and Security Agreement means that certain Guarantee and Security Agreement dated as of the Effective Date among the Borrower, the Administrative Agent, each Subsidiary of the Borrower from time to time party thereto, each holder (or an authorized agent, representative or trustee therefor) from time to time of any Secured Longer-Term Indebtedness or Secured Shorter-Term Indebtedness, and the Collateral Agent.

  • LCR Security means any commercial paper or security (other than equity securities issued to Parent or any Originator that is a consolidated subsidiary of Parent under GAAP) within the meaning of Paragraph .32(e)(viii) of the final rules titled Liquidity Coverage Ratio: Liquidity Risk Measurement Standards, 79 Fed. Reg. 197, 61440 et seq. (October 10, 2014).

  • Conditional Access System means any technical measure and/or arrangement whereby access to a protected radio or television broadcasting service in intelligible form is made conditional upon subscription or other form of prior individual authorisation;

  • Security means a mortgage, charge, pledge, lien or other security interest securing any obligation of any person or any other agreement or arrangement having a similar effect.

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Firearm accessory means a device specifically designed or adapted to enable an individual to wear, carry, store, or mount a firearm on the individual or on a conveyance and an item used in conjunction with or mounted on a firearm that is not essential to the basic function of the firearm. The term includes a detachable firearm magazine.

  • Security Documentation means the Security Documentation applicable to the specific Services purchased by Client, as updated from time to time, or as otherwise made reasonably available by IRONSCALES.

  • of a Security means the principal of the Security plus the premium, if any, payable on the Security which is due or overdue or is to become due at the relevant time.

  • The HIPAA Security Rule means the Security Standards for the Protection of 23 electronic PHI at 45 CFR Part 160, Part 162, and Part 164, Subparts A and C.

  • Access Application means an application for Access Rights as described in section 3.7;

  • Accessory use means a use which is incidental and subordinate to the principal use of the parcel of land on which it is located.

  • Bid Security means the bid security provided by the Contractor to the Authority in accordance with the Request for Proposal, and which is to remain in force until substituted by the Performance Security;

  • Cyber Security means the condition in which road vehicles and their functions are protected from cyber threats to electrical or electronic components.

  • Russian Security means a Security issued by a Russian issuer.

  • Access Agreement means a landlord consent, bailee letter or warehouseman’s letter, in form and substance reasonably satisfactory to Agent, in favor of Agent executed by such landlord, bailee or warehouseman, as applicable, for any third party location.

  • Baggage and Personal Effects means luggage, personal possessions and travel documents taken by You on Your Trip.

  • Conditional Access means control mechanisms, data structures and commands that scramble and encrypt signals in order to provide selective access and denial of specific channels, data, information or services to paying Subscribers.