Access Security Sample Clauses

Access Security. All Email addresses provided in connection with interoperable system(s) user accounts must be associated to an approved email account assigned by the user's emergency management organization. The use of personal email accounts to support emergency messaging through IPAWS-OPEN is prohibited. • Upon approval of the MOA by FEMA, a COG account with COGID and Digital Certificate will be created and issued to the designated technical representative. All individuals with knowledge of these credentials must not share or alter these authentication mechanisms without explicit approval from IPAWS. • Every interoperable system user is responsible for remote access security as it relates to their use of IPAWS-OPEN and shall abide by these Rules of Behavior.
AutoNDA by SimpleDocs
Access Security. 5.1 Access privileges for all IT Systems is determined on the basis of employee levels of authority within Bitrix24 Company organization structure and the requirements of their job roles. Employees are not granted access to any IT Systems or electronic data which are not reasonably required for the fulfilment of their job roles.
Access Security. Company will take reasonable security measures to protect the Protected Health Information from unauthorized access. Access to Company’s computer networks and systems and the Protected Health Information will be controlled via a user ID and password. COMPANY IS NOT RESPONSIBLE FOR ANY UNAUTHORIZED USE OR DISCLOSURE OF A USER ID OR PASSWORD, OR FOR ANY BREACH OF THIS ADDENDUM ARISING AS A RESULT OF ANY SUCH UNAUTHORIZED USE OR DISCLOSURE BY OR ON BEHALF OF CLIENT.
Access Security. Only the Researcher and Research Team should have access to MSSNG Data. MSSNG Data must not be stored on any removeable media, such as a USB thumb drive or external hard drive at any time.
Access Security. 5.1 Contractor shall be held solely responsible for the security of the facility while on the premises and is also responsible for leaving the facility secure after performance of the cleaning service.
Access Security. The Customer’s access to and use of the Site and the E-Banking Services is restricted to the Program Administrator(s) and designated Authorizer(s) and User(s), and the parties agree that the agreed security procedure to control access to and use of the Site and the E-Banking Services will be user IDs and passwords and, subject to the Bank’s approval, may include other forms of authentication that the Bank may from time-to-time decide to utilize. The Bank will provide the Customer with user IDs for Program Administrators, Authorizers and Users, and a password associated with each user ID will be initially assigned by the Bank in accordance with procedures designated by the Bank. As soon as reasonably practicable, the Customer must change the password initially assigned by the Bank in accordance with procedures designated by the Bank.
Access Security. 1. Tenant shall not place any additional lock or locks on any exterior door in the Premises or Building or on any door in the Building core within the Premises, including doors providing access to the telephone and electric closets and the slop sink, without Laxxxxxx’s prior written consent. A reasonable number of keys to the locks on the doors in the Premises shall be furnished by Landlord to Tenant at the cost of Tenant, and Tenant shall not have any duplicate keys made. All keys shall be returned to Landlord at the expiration or earlier termination of this Lease.
AutoNDA by SimpleDocs
Access Security. Landlord shall furnish to Tenant’s employees and agents access to the Premises on a seven (7) day per week, twenty-four (24) hour per day basis, subject to compliance with such reasonable and non-discriminatory security measures as shall from time to time be in effect for the Building and/or the Project, Landlord maintenance activities and subject to the reasonable and non-discriminatory rules and regulations from time to time established by Landlord. The parties acknowledge that Landlord shall provide an exterior telephone communication system on the exterior wall of the Building for access to the Building and Premises after Normal Working Hours, by which Tenant’s guests or invitees or other persons shall be able to contact Tenant or the security personnel of the Building and provide a previously arranged password for entry into the Building and Premises; provided, however, that this current security system is subject to modification from time to time in the reasonable discretion of Landlord and/or to comply with Applicable Laws as may be in force from time to time, provided that Tenant’s access and security rights hereunder are not materially diminished. Landlord does not warrant the effectiveness of said security equipment, procedures and personnel provided by Landlord and Tenant shall have the right, subject to review and approval of Landlord, at Tenant’s expense, to provide additional security equipment or personnel in the Premises, provided that Landlord is given reasonable access to the Premises and that any such security system installed by Tenant complies with all Applicable Laws and building codes and shall not create any material security risk to the Building or materially adversely affect the rights of other tenants in the Project. At Tenant’s request, elevator access to the Premises may be locked from time to time and accessible only by use of the security card reader system installed by Landlord for the Project. Landlord shall provide Tenant with twelve (12) security cards for use with Landlord’s security card reader system, each of which security cards shall require a $25.00 deposit with Landlord, returnable to Tenant upon return of the security card to Landlord. Tenant shall designate no more than two (2) persons to communicate with Landlord’s security vendor, as may be changed from time to time, currently UPS, to lock and unlock the elevator doors and access to the Premises. To the extent that it is feasible to link Tenant’s additional sec...
Access Security. STI shall adhere to all AT&T access control requirements as defined in Section 4.1 Access of the MSA. STI utilizes a combination of access control ***.
Access Security. In order to subscribe to Services, you must register to create an account (“User Account”). When you register, you will be asked to create a password, which you will be required to use to access your User Account together with your username. Financial Guard has physical, electronic and procedural safeguards that comply with federal standards to guard Users’ non-public personal information (see Financial Guard’s Notice of Privacy Policy). You are responsible for safeguarding your username, password and other User Account information. You agree not to disclose your username and password to any third party and you will notify Financial Guard immediately if your username and/or password are lost or stolen or if you suspect any unauthorized use of your User Account. As a User, you agree that you shall be solely responsible for any activities or actions under your User Account, whether or not you have authorized such activities or actions and that Financial Guard is not responsible for losses or damages of any kind due to your failure to comply with these requirements.
Time is Money Join Law Insider Premium to draft better contracts faster.