COMMON ACCESS Sample Clauses

COMMON ACCESS. CARD (CAC) REQUIREMENT The COR will identify and approve those contractor employees performing on this contract that require CACs in order to perform their job function. In accordance with Headquarters, United States Marine Corps issued guidance relative to Homeland Security Presidential Directive – 12 (HSPD-12), all personnel must meet eligibility criteria to be issued a CAC. In order to meet the eligibility criteria, contractor employees requiring a CAC, must obtain and maintain a favorably adjudicated Personnel Security Investigation (PSI.) Prior to authorizing a CAC, the employee’s Joint Personnel Adjudication System (JPAS) record must indicate a completed and favorably adjudicated PSI or (at a minimum) that a PSI has been submitted and accepted (opened). The minimum acceptable investigation is a T-1 or a National Agency Check with Written Inquiries (NACI). If a contractor employee’s open investigation closes and is not favorably adjudicated, the CAC must be immediately retrieved and revoked. Facility Security Officers (FSOs) are responsible for notifying the MARCORSYSCOM AC/S G-2 if any Contractor performing on this contract receives an unfavorable adjudication after being issued a CAC. The FSO must also notify the MARCORSYSCOM AC/S G-2 of any adverse/derogatory information associated with the 13 Adjudicative Guidelines/Factors concerning any contractor issued a CAC, regardless of whether a JPAS Incident Report is submitted. Each CAC is issued with a “xxx@xxxx.xxx” e-mail account that the individual Contractor is responsible to keep active by logging in on a regular basis (at least twice a month), sending an e-mail and clearing any unneeded e- mails. Contractors are prohibited from “auto-forwarding” their .mil e-mail account to their .com e-mail account. If the xxx.xxxx.xxx e-mail account is not kept active, the G-6 will deactivate the account and CAC will lose its functionality. Contractor employees shall solely use their government furnished “xxx@xxxx.xxx” e-mail accounts for work supporting the USMC, conducted in fulfillment of this contract, and shall not use a contractor supplied or personal e-mail account to conduct government business. The use of a contractor or personal e-mail account for contractor business or personal use is allowed, but only when using cellular or a commercial internet service provider. CACs will be issued to only those Contractors supporting this contract that have been authorized by the COR. The COR will authorize CACs on...
AutoNDA by SimpleDocs
COMMON ACCESS. The Promoter has informed the Allottee that there may be common access space/ passages, electricity, water lines, drainage lines, sewerage lines, sewerage treatment plant and other common conveniences in the layout of the Property. The Promoter has further informed the Allottee that all the expenses and charges of the aforesaid conveniences may be common and the Allottee along with other Allottee/s of Flat in the Said Project and/or the Real Estate Project and/or in the Whole Project, and the Allottee shall share such expenses and charges in respect thereof as also maintenance charges proportionately. Such proportionate amounts shall be payable by each of the Allottee of Flat in the Real Estate Project including the Allottee herein and the proportion to be paid by the Allottee shall be determined by the Promoter and the Allottee agrees to pay the same regularly without raising any dispute or objection with regard thereto.

Related to COMMON ACCESS

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Union Access 54. The Union shall have reasonable access to all work locations to verify that the terms and conditions of this Agreement are being carried out and for the purpose of conferring with employees provided that access shall be subject to such rules and regulations immediately below, as well as to such rules and regulations as may be agreed to by the department and the Union.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Building Access i. Access to Secured buildings: Contractor will work through the GIT Contract administrator for access to the building.

  • ICANN Access Registry Operator shall provide bulk access to the zone files for the TLD to ICANN or its designee on a continuous basis in the manner ICANN may reasonably specify from time to time. Access will be provided at least daily. Zone files will include SRS data committed as close as possible to 00:00:00 UTC.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • WORK ACCESS The Association shall provide a current, written list of its Association Representatives to all heads of departments, offices, or bureaus represented herein and the CAO. The Association shall be responsible for keeping the list current. An Association Representative shall have access to department, office, or bureau facilities where Unit members are employed during regular working hours to assist employees covered under this MOU in addressing grievances when such Association assistance is requested by a grievant(s) or to investigate matters arising out of the application of the provisions of this MOU. The Association Representative shall request authorization for such visits by contacting the designated Management representative of the head of the office, department, or bureau. In the event immediate access cannot be authorized, the designated Management representative shall inform the Association Representative as to the earliest time when access can be granted. This Article shall not be construed as a limitation on the power of the head of a department, office, or bureau to restrict access to areas designated for security or confidential purposes.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

Time is Money Join Law Insider Premium to draft better contracts faster.