Building Access Cards Sample Clauses

Building Access Cards. Prior to the Commencement Date, Tenant shall submit to Landlord a list of employees or Approved Users needing Building Access Cards. Based upon such list, Landlord will provide Tenant a maximum of one (1) Building Access Card per employee or Approved User. After the Commencement Date, any replacement or additional cards will be furnished at a cost to Tenant of Twenty-Five Dollars ($25.00) per card, but any cards may be re-assigned to another employee or Approved User without cost.
AutoNDA by SimpleDocs
Building Access Cards. Each tenant assigns an Access Control Coordinator to be a liaison with Boston Properties’ Management and who has the following responsibilities: ● Provide an employee listing to the management office to obtain building access cards prior to movein. ● Educate new employees in the use of their access card including proper use of the card readers and procedures for nonbusiness hours’ access. ● Administer their employee cardholder database. ● Notify management office of lost access cards and employee terminations. Occasionally, access cards malfunction. If an employee is experiencing a problem, the Access Control Coordinator should first ensure the employee is using the card properly. If the problem persists, the Access Control Coordinator should contact the Management Office for assistance. Upon termination of an employee, the employee's access card must be surrendered to the Access Control Coordinator on or before the last day of employment. The employee’s information should be reported immediately to the management office so that the card can be deactivated.
Building Access Cards. The Board shall distribute a security access card to each employee at the beginning of each school year. The security access card shall provide the employee ease of access through all designated entrances to the school building. The access cards shall be collected at the end of every school year. Any employee whose access card is lost, stolen, vandalized or mutilated shall be given a replacement card the first time this occurs at no cost to the employee. Thereafter, the employee shall reimburse the Board twenty-five dollars ($25) for a replacement card. The Board reserves the sole and exclusive right to discontinue the security access cards at any time it determines the use of such cards is no longer practicable.

Related to Building Access Cards

  • Building Access i. Access to Secured buildings: Contractor will work through the GIT Contract administrator for access to the building.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • LANDLORD'S ACCESS TO PREMISES Landlord reserves and shall at any time upon reasonable notice and in compliance with Tenant’s reasonable security measures have the right to enter the Premises to inspect the same, to supply any service to be provided by Landlord to Tenant hereunder to service and repair HVAC units, water pipes and sprinkler mains, and electrical and telephone risers servicing other parts of the Building, to show said Premises to prospective purchasers or tenants, to alter or repair the Premises or any portion of the Building, and to place “for sale” or “for rent” signs on the Building, all without being deemed guilty of an eviction of Tenant and without abatement of Rent, provided that the business of Tenant shall be interfered with as little as is reasonably practicable. Tenant hereby waives any claim for damages or any inconvenience to or interference with Tenant’s business, any loss of quiet enjoyment of the Premises and any other loss occasioned thereby. For each of the aforesaid purposes, Landlord shall at all times have and retain a key with which to unlock the main door to the Premises but not Tenant’s vaults and safes, and Landlord shall have the right to use any and all means which Landlord may deem proper to open said door in an emergency in order to obtain entry to the Premises, and any entry to the Premises obtained by Landlord by any of said means shall not under any circumstances be construed or deemed to be a forcible or unlawful entry into, or a detainer of the Premises, or any eviction of Tenant from the Premises or any portion thereof. No provision of this Lease shall be construed as obligating Landlord to perform any repairs, alterations or decoration except as otherwise expressly agreed to be performed by Landlord.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Communications Equipment Members of the board of directors or any committee thereof may participate in and act at any meeting of such board or committee through the use of a conference telephone or other communications equipment by means of which all persons participating in the meeting can hear each other, and participation in the meeting pursuant to this section shall constitute presence in person at the meeting.

  • LESSOR'S ACCESS; SHOWING PREMISES; REPAIRS Lessor and Lessor's agents shall have the right to enter the Premises at any time, in the case of an emergency, and otherwise at reasonable times for the purpose of showing the same to prospective purchasers, lenders, or lessees, and making such alterations, repairs, improvements or additions to the Premises or to the Building, as Lessor may reasonably deem necessary. Lessor may at any time place on or about the Premises or Building any ordinary "For Sale" signs and Lessor may at any time during the last one hundred eighty (180) days of the term hereof place on or about the Premises any ordinary "For Lease" signs. All such activities of Lessor shall be without abatement of rent or liability to Lessee.

  • Landlord’s Access Landlord shall be entitled at all reasonable times and upon reasonable notice to enter the Premises to examine them and to make such repairs, alterations, or improvements thereto as Landlord is required by this Lease to make or which Landlord considers necessary or desirable; provided, Landlord shall comply with all law in respect of any such entry; Landlord may require Tenant provide an accompanying staff member or employee with any such entry; Landlord will honor any specifically closed-off areas as may be required by law for security and safety; but Landlord may nonetheless act as prudent and necessary in case of emergency. Tenant shall not unduly obstruct any pipes, conduits, or mechanical or other electrical equipment so as to prevent reasonable access thereto. Landlord shall exercise its rights under this section, to the extent possible in the circumstances, in such manner so as to reduce, if practical, interference with Tenant’s use and enjoyment of the Premises. Subject to the foregoing, Landlord and its agents have the right to enter the Premises at all reasonable times and upon reasonable notice to show them to prospective purchasers, lenders, or anyone having a prospective interest in the Buildings, and, during the last six (6) months of the Term or any renewal thereof, to show them to prospective tenants. Landlord will have the right at all times to enter the Premises with Tenant or licensed individual(s) on behalf of the Tenant to escort the Landlord in the event of an emergency affecting the Premises, subject to any applicable limitations required by the Marijuana Code or any other applicable regulations. Although Landlord shall not have the right to place “For Lease” signs in the Premises, or upon the exterior of the Premises itself, nothing herein shall limit Landlord’s rights to promote, advertise, place “For Lease” signs or otherwise market leasing of the Property in whatever lawful manner Landlord may elect, as long as such manner(s) do not materially interfere with the Premises.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • WORK ACCESS The Association shall provide a current, written list of its Association Representatives to all heads of departments, offices, or bureaus represented herein and the CAO. The Association shall be responsible for keeping the list current. An Association Representative shall have access to department, office, or bureau facilities where Unit members are employed during regular working hours to assist employees covered under this MOU in addressing grievances when such Association assistance is requested by a grievant(s) or to investigate matters arising out of the application of the provisions of this MOU. The Association Representative shall request authorization for such visits by contacting the designated Management representative of the head of the office, department, or bureau. In the event immediate access cannot be authorized, the designated Management representative shall inform the Association Representative as to the earliest time when access can be granted. This Article shall not be construed as a limitation on the power of the head of a department, office, or bureau to restrict access to areas designated for security or confidential purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.