Emergency Access Plan Sample Clauses

Emergency Access Plan. An emergency ingress/egress plan by emergency vehicles and the public to apply during construction shall be required for the affected communities (Brickyard Landing, Brickyard Cove #1, Brickyard Cove #2, Sea Cliff, Waterline, Richmond Yacht Club, Terminal One (Latitude), as a condition of approval of the Project and included in the Mitigation Measures. As it is understood that various factors currently impact such ingress/egress, such as rail operations, the City shall be involved with the development of the plan and shall provide a long-range focus so that (i) it will operate for the benefit of all the BYC Communities, and (ii) shall apply as future projects develop..
AutoNDA by SimpleDocs

Related to Emergency Access Plan

  • Emergency Access Landlord shall have the right to enter the Premises at any time without notice in the event of an emergency.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Emergency Operator Access Registry Operator shall provide bulk access to the zone files for the TLD to the Emergency Operators designated by ICANN on a continuous basis in the manner ICANN may reasonably specify from time to time.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • WORK ACCESS The Association shall provide a current, written list of its Association Representatives to all heads of departments, offices, or bureaus represented herein and the CAO. The Association shall be responsible for keeping the list current. An Association Representative shall have access to department, office, or bureau facilities where Unit members are employed during regular working hours to assist employees covered under this MOU in addressing grievances when such Association assistance is requested by a grievant(s) or to investigate matters arising out of the application of the provisions of this MOU. The Association Representative shall request authorization for such visits by contacting the designated Management representative of the head of the office, department, or bureau. In the event immediate access cannot be authorized, the designated Management representative shall inform the Association Representative as to the earliest time when access can be granted. This Article shall not be construed as a limitation on the power of the head of a department, office, or bureau to restrict access to areas designated for security or confidential purposes.

  • Emergency Mode Operation Plan Contractor must establish a documented plan to enable continuation of critical business processes and protection of the security of electronic DHCS PHI or PI in the event of an emergency. Emergency means any circumstance or situation that causes normal computer operations to become unavailable for use in performing the work required under this Agreement for more than 24 hours.

  • Emergency Work Employees who are required to report for emergency work on non- workdays, or outside of their regular hours of work on a scheduled workday or on holidays which they are entitled to have off, shall be paid overtime compensation for the actual work time and for travel time in connection therewith, but such travel time shall not exceed one-half (1/2) hour.

  • Construction Management Plan Contractor shall prepare and furnish to the Owner a thorough and complete plan for the management of the Project from issuance of the Proceed Order through the issuance of the Design Professional's Certificate of Material Completion. Such plan shall include, without limitation, an estimate of the manpower requirements for each trade and the anticipated availability of such manpower, a schedule prepared using the critical path method that will amplify and support the schedule required in Article 2.1.5 below, and the Submittal Schedule as required in Article 2.2.3. The Contractor shall include in his plan the names and resumés of the Project Superintendent, Project Manager and the person in charge of Safety.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Emergency Generator (a) Tenant, subject to Landlord’s review and approval of Txxxxx’s plans therefor, shall have the right to install a supplemental generator (the “Generator” which term shall include associated power and fuel lines), to provide emergency additional electrical capacity to the Premises during the Term, in an electrical capacity to be reasonably approved by Landlord. Tenant’s plans for the Generator shall include a secondary containment system to protect against and contain any release of hazardous materials. The Generator shall be placed in an area (the “Generator Area”) measuring approximately 20’ x 20’ to be designated by Landlord on the roof and, with respect to such associated power and fuel lines, in such conduits or other areas as Landlord shall designate. Notwithstanding the foregoing, Txxxxx’s right to install the Generator shall be subject to Landlord’s approval of the manner in which the Generator is installed, the manner in which any fuel pipe is installed, the manner in which any ventilation and exhaust systems are installed, the manner in which any cables are run to and from the Generator to the Premises and the measures that will be taken to eliminate any vibrations or sound disturbances from the operation of the Generator, including, without limitation, any necessary 2 hour rated enclosures or sound installation. Landlord shall have the right to require an acceptable enclosure to hide or disguise the existence of the Generator and to minimize any adverse effect that the installation of the Generator may have on the appearance of the Building and the Property. Tenant shall be solely responsible for obtaining all necessary governmental and regulatory approvals and for the cost of installing, operating, maintaining and removing the Generator. Tenant shall not install or operate the Generator until Tenant has obtained and submitted to Landlord copies of all required governmental permits, licenses and authorizations necessary for the installation and operation of the Generator. In addition to, and without limiting Tenant’s obligations under the Lease, Tenant shall comply with all applicable environmental and fire prevention Laws pertaining to Tenant’s use of the Generator Area. Tenant shall also be responsible for the cost of all utilities consumed in the operation of the Generator.

Time is Money Join Law Insider Premium to draft better contracts faster.