Access to Security Identification Display Areas and Identification Media Sample Clauses

Access to Security Identification Display Areas and Identification Media. Concessionaire shall be responsible for requesting the Aviation Department to issue Airport Issued Identification Media to all employees who are authorized access to Security Identification Display Areas ("SIDA") on the Airport, as designated in the Airport Security Program. In addition, Concessionaire shall be responsible for the immediate reporting of all lost or stolen Airport Issued Identification Media and the immediate return of the media of Concessionaire's personnel transferred from the Airport, or terminated from the employ of Concessionaire, or upon termination of this Agreement. Before an Airport Issued Identification Media is issued to an employee, Concessionaire shall comply with the requirements of applicable Federal regulations with regard to fingerprinting for criminal history record checks and security threat assessments, and shall require that each employee complete security training programs conducted by the Aviation Department. Concessionaire shall pay or cause to be paid to the Aviation Department such charges as may be established from time to time for lost or stolen Airport Issued Identification Media and those not returned to the Aviation Department in accordance with these provisions. The Aviation Department shall have the right to require Concessionaire to conduct background investigations and to furnish certain data on such employees before the issuance of Airport Issued Identification Media, which data may include the fingerprinting of employee applicants for such media.
AutoNDA by SimpleDocs
Access to Security Identification Display Areas and Identification Media. The consultant/contractor shall be responsible for requesting the Aviation Department to issue Airport Issued Identification Media to all employees who are authorized access to Security Identification Display Areas ("SIDA") on the Airport, as designated in the Airport Security Program. In addition, consultant/contractor shall be responsible for the immediate reporting of all lost or stolen Airport Issued Identification Media and the immediate return of the media of consultant/contractor's personnel transferred from the Airport, or terminated from the employ of the consultant/contractor, or upon termination of this Agreement. Before an Airport Issued Identification Media is issued to an employee, consultant/contractor shall comply with the requirements of applicable Federal regulations with regard to fingerprinting for criminal history record checks and security threat assessments, and shall require that each employee complete security training programs conducted by the Aviation Department. The consultant/contractor shall pay or cause to be paid to the Aviation Department such charges as may be established from time to time for lost or stolen Airport Issued Identification Media and those not returned to the Aviation Department in accordance with these provisions. The Aviation Department shall have the right to require the consultant/contractor to conduct background investigations and to furnish certain data on such employees before the issuance of Airport Issued Identification Media, which data may include the fingerprinting of employee applicants for such media.
Access to Security Identification Display Areas and Identification Media. Provider shall be responsible for requesting the Aviation Department to issue Airport Issued Identification Media to all Provider's and its subcontractors employees who are authorized access to Security Identification Display Areas ("SIDA") on the Airport, as designated in the Airport Security Program. In addition, Provider shall be responsible for the immediate reporting of all lost or stolen Airport Issued Identification Media and the immediate return of the media of Provider's and its subcontractor's personnel transferred from the Airport, or terminated from the employ of Provider or any if its subcontractors, or upon termination of this Agreement. Before an Airport Issued Identification Media is issued to an employee of Provider or any of its subcontractors, Provider shall comply with the requirements of applicable federal regulations with regard to fingerprinting for criminal history record checks and security threat assessments, and shall require that each employee complete security training programs conducted by the Aviation Department. Provider shall pay or cause to be paid to the Aviation Department such charges as may be established from time to time for lost or stolen Airport Issued Identification Media and those not returned to the Aviation Department in accordance with these provisions. The Aviation Department shall have the right to require Provider to conduct background investigations and to furnish certain data on such employees before the issuance of Airport Issued Identification Media, which data may include the fingerprinting of employee applicants for such media.

Related to Access to Security Identification Display Areas and Identification Media

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Partnership Formation and Identification 6 2.1 Formation............................................................................................ 6 2.2 Name, Office and Registered Agent.................................................................... 6 2.3 Partners............................................................................................. 6 2.4

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • Access to Company Information (a) The Company shall (and shall cause each Company Subsidiary to) permit representatives of the Parent to have full access (at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Company and the Company Subsidiaries) to all premises, properties, financial and accounting records, contracts, other records and documents, and personnel, of or pertaining to the Company and each Company Subsidiary.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Customer Identification - USA Patriot Act Notice The Lender hereby notifies the Borrower that pursuant to the requirements of the USA Patriot Act (Title III of Pub. L. 107-56, signed into law October 26, 2001) (the “Act”), and the Lender’s policies and practices, the Lender is required to obtain, verify and record certain information and documentation that identifies the Borrower, which information includes the name and address of the Borrower and such other information that will allow the Lender to identify the Borrower in accordance with the Act.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

Time is Money Join Law Insider Premium to draft better contracts faster.