Security Perimeter Sample Clauses

Security Perimeter a. There will be a security perimeter along the Delimiting Line inside the Gaza Strip as delineated on attached map No. 2 by a broken green line (hereinafter "the Security Perimeter").
AutoNDA by SimpleDocs
Security Perimeter. The outer portions of a facility, which actually provide for secure confinement of detainees.
Security Perimeter. Access will be controlled and restricted by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls. A record of all accesses will be securely maintained.
Security Perimeter. The Concessionaire shall at its own costs and expenses, maintain an adequate perimeter enclosed by barriers and controls, inside and around the facility, in accordance with the applicable laws, rules, regulations and decrees including also the Standards of Annex 17, Doc 30 of ECAC and national ones.

Related to Security Perimeter

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Assembly of Collateral Assemble and make available to the Administrative Agent the Collateral and all records relating thereto at any place or places specified by the Administrative Agent.

  • Inspection of Collateral Lender and Lender's designated representatives and agents shall have the right at all reasonable times to examine and inspect the Collateral wherever located.

  • Engines POSITION SERIAL NO. TOTAL HOURS TOTAL CYCLES HRS/CYCLES SINCE LAST SHOP VISIT Time Remaining to Next LIFE LIMITED PART REMOVAL PART NAME HOURS CYCLES MSN MSN

  • Possession and Assembly of Collateral Secured Party may, without notice, demand or initiate legal process of any kind, take possession of any or all of the Collateral (in addition to Collateral of which Secured Party already has possession), wherever it may be found, and for that purpose may pursue the same wherever it may be found, and may at any time enter into any of Grantor's premises where any of the Collateral may be or is supposed to be, and search for, take possession of, remove, keep and store any of the Collateral until the same shall be sold or otherwise disposed of and Secured Party shall have the right to store and conduct a sale of the same in any of Grantor's premises without cost to Secured Party. At Secured Party's request, Grantor will, at Grantor’s sole expense, assemble the Collateral and make it available to Secured Party at a place or places to be designated by Secured Party which is reasonably convenient to Secured Party and Grantor.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Vessels Each Vessel is

Time is Money Join Law Insider Premium to draft better contracts faster.