Equipment or Material Access and Removal Access Sample Clauses

Equipment or Material Access and Removal Access. The Contractor ensures that all equipment and materials brought through the security gate is signed in at the main security gate on an OV18 form. Removal  The Contractor is not allowed to remove any equipment or materials from site without producing the relevant OV18 forms or the equipment lists.  If the equipment or material is to be removed the same day, on which they were brought on to site, then the OV18 form will need to be produced at the gate when leaving the site.  If the equipment or material is removed after this time then a Non Returnable Gate Release will be provided by the Employer’s Representative, on receipt of the original OV18, with which the Contractor brought the equipment on site. Site or Area Establishment and Evacuation Application for Site Establishment:  The Contractor is entitled to apply for a site on the relevant form as detailed in LBA 00030. This application must be submitted with the tender documents.  Sites are allocated according to availability, the period for which the Contractor is going to be on site, or if special circumstances warrant the allocation of a site. Documentation to support this application can be submitted  The location of the site or area is indicated during the site or area take-over inspection. Site Establishment:  The Contractor does not occupy any site or area other than that allocated to him.  The Contractor does not occupy the site or area prior to the take-over inspection.  The Contractor maintains the site or area provided to him to the satisfaction of the Employer.  The Employer subjects the Contractor’s site or area to periodic inspection. Site Evacuation:
AutoNDA by SimpleDocs
Equipment or Material Access and Removal Access. The Contractor ensures that all equipment and materials brought through the security gate is signed in at the main security gate on an OV18 form. Removal  The Contractor is not allowed to remove any equipment or materials from site without producing the relevant OV18 forms or the equipment lists.  If the equipment or material is to be removed the same day, on which they were brought on to site, then the OV18 form will need to be produced at the gate when leaving the site.  If the equipment or material is removed after this time then a Non-Returnable Gate Release will be provided by the Employer’s Representative, on receipt of the original OV18, with which the Contractor brought the equipment on site.

Related to Equipment or Material Access and Removal Access

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Additional Requirements from Authorized Users An Authorized User may have distinct requirements that must be met by all individuals employed by or working for the Authorized User. The Contractor’s Staff Members will be expected to comply with these requirements as a condition of the placement.

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Use of Interconnection Facilities by Third Parties 46 9.9.1 Purpose of Interconnection Facilities 46 9.9.2 Third Party Users. 46

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

Time is Money Join Law Insider Premium to draft better contracts faster.