Energy Security Sample Clauses

Energy Security. This is increasingly becoming a priority for the EU and therefore, there is a need for EIB and EBRD to continue to work together on these politically and technically complex deals. In these areas, the two Banks would closely cooperate at sector level, and explore all suitable possibilities for project co-financing.
AutoNDA by SimpleDocs
Energy Security. The Pechanga Band of Luiseño Mission Indians is a sovereign nation 20 with responsibility for the safety and well-being of its territory and members. By increasing 21 its energy security and independence, the Tribe can more effectively fulfill these 22 responsibilities and improve the security of its water, food supply, and economic 23 infrastructure for the betterment of the Tribe, fellow tribal nations, and surrounding 24 communities.

Related to Energy Security

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • Facility Security Contractor shall keep all doors locked while working in any buildings on the site. Keys shall not be left in the doors. Contractor shall not admit any person into the building that is not a direct employee of the Contractor and not actively engaged in performance of the Work. Contractor shall restrict access to the areas of the facility not specifically included in this Contract for construction services. The Contractor shall check all windows and doors for proper closure and locking, extinguish all lights except master security lighting, and then reactivate the security system (if applicable) prior to leaving the facility.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Supply Chain Security Seller warrants that it has reviewed its supply chain security procedures and that these procedures and their implementation are in accordance with the criteria set forth by the Customs-Trade Partnership Against Terrorism (“C-TPAT”) program of the U.S. Bureau of Customs and Border Protection. Specifically, Seller warrants that it is applying C- TPAT prescribed inspectional methods prior to loading of the transport conveyance; is maintaining secure control over its loaded and empty transport conveyances; is controlling and applying certified high security seals for securing transport conveyance doors; and is ensuring that its business partners are observing the criteria set forth by C-TPAT. Seller further warrants and represents that it has developed and implemented, or will develop and implement, procedures for periodically reviewing and, if necessary, improving its supply chain security procedures. Specifically, Seller agrees to conduct an annual security audit at each of its facilities and to take all necessary corrective actions to ensure conformity with C-TPAT standards. Seller agrees to share with Buyer the results of such annual audits and agrees to prepare and submit to Buyer a report on the corrective actions taken in response thereto. In the event Seller fails to take an appropriate corrective action, Buyer may, but is not required to, terminate this Order. Buyer’s auditors will be provided access to Seller’s records and facilities for the purpose of verifying that Seller’s procedures are in accordance with the criteria set forth by C-TPAT. If Seller is enrolled in any supply chain security accredited programs, such as C-TPAT or other similar programs that may exist in the country of Seller, then Seller shall provide Buyer with documentary evidence of such enrollment.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

Time is Money Join Law Insider Premium to draft better contracts faster.