IT Physical Security and Access Control Sample Clauses

IT Physical Security and Access Control. The Contractor must establish processes and procedures for physical access to and control of their own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Contractor employees are expected to:  Comply with facility access procedures, using procedures such as sign-in/sign-out requirements and use of assigned ID badges.  Scan ID badges, where applicable, at any secure door and/or entrance and exit gates, including any door or gate that may already be open.  Refrain from using recordable media in conjunction with County-owned equipment.  Comply with check-in/check-out requirements for materials and/or equipment.  Adhere to the facility’s established emergency, safety and evacuation procedures.  Report any unsafe conditions to the facility’s safety representative.  Report any access violations or security threats to the facility’s local security administrator.
AutoNDA by SimpleDocs
IT Physical Security and Access Control. The Contractor shall establish processes and procedures that are, at a minimum, consistent with best practices. Contractor employees are expected to:  Comply with facility access procedures, including sign-in/sign-out requirements and use of assigned ID badges  Scan ID badges at any secure door and/or entrance and exit gates, including any door or gate that may already be open  Refrain from using recordable media in conjunction with County-owned equipment  Comply with sign-in/sign-out requirements for materials and/or equipmentAdhere to a facility’s established emergency, safety and evacuation procedures  Report any unsafe conditions to the facility’s Department Safety Representative (DSR)  Report any access violations or security threats to the facility’s Local Security Administrator (LSA)
IT Physical Security and Access Control. The vendor must establish processes and procedures for physical access to and control of their own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Vendor employees are expected to:
IT Physical Security and Access Control. The vendor must establish processes and procedures for physical access to and control of their own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Vendor employees are expected to: ▪ Comply with facility access procedures, using procedures such as sign- in/sign-out requirements and use of assigned ID badges. ▪ Scan ID badges, where applicable, at any secure door and/or entrance and County of Orange MA-042-20012181 Health Care Agency Page 55 of 65 Folder No. C025988 exit gates, including any door or gate that may already be open. ▪ Refrain from using recordable media in conjunction with County-owned equipment. ▪ Comply with check-in/check-out requirements for materials and/or equipment. ▪ Adhere to the facility’s established emergency, safety and evacuation procedures. ▪ Report any unsafe conditions to the facility’s safety representative. ▪ Report any access violations or security threats to the facility’s local security administrator.
IT Physical Security and Access Control. 27 The vendor shall establish processes and procedures that are, at a minimum, consistent with best 28 practices. 29 30 Vendor employees are expected to: 32 ▪ Comply with facility access procedures, including sign-in/sign-out requirements and use
IT Physical Security and Access Control. The Contractor must establish processes and procedures for physical access to and control of the ir own facilities that are, at a minimum, consistent with relevant industry-specific best practices. Contractor employees are expected to:  Comply with facility access procedures, using procedures such as sign-in/sign-out requirements and use of assigned ID badges.  Scan ID badges, where applicable, at any secure door and/or entrance and exit gates, including any door or gate that may already be open.  Refrain from using recordable media in conjunction with County-owned equipment.  Comply with check-in/check-out requirements for materials and/or equipment.  Adhere to the facility’s established emergency, safety and evacuation procedures.  Report any unsafe conditions to the facility’s safety representative.  Report any access violations or security threats to the facility’s local security administrator.
IT Physical Security and Access Control. 17 The vendor shall establish processes and procedures that are, at a minimum, consistent with best 18 practices. 19 20 Vendor employees are expected to: 22 ▪ Comply with facility access procedures, including sign-in/sign-out requirements and use 23 of assigned ID badges 24 ▪ Scan ID badges at any secure door and/or entrance and exit gates, including any door or 25 gate that may already be open 26 ▪ Refrain from using recordable media in conjunction with County-owned equipment 27 ▪ Comply with sign-in/sign-out requirements for materials and/or equipment
AutoNDA by SimpleDocs

Related to IT Physical Security and Access Control

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Control and Access to Information The Financial Mechanism Committee, the EFTA Board of Auditors and their representatives have the right to carry out any technical or financial mission or review they consider necessary to follow the planning, implementation and monitoring of programmes and projects as well as the use of funds. The Beneficiary State shall provide all necessary assistance, information and documentation.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Balancing Authority Area Notification At least three months before Initial Synchronization Date, the Interconnection Customer shall notify the CAISO and Participating TO in writing of the Balancing Authority Area in which the Large Generating Facility intends to be located. If the Interconnection Customer intends to locate the Large Generating Facility in a Balancing Authority Area other than the Balancing Authority Area within whose electrically metered boundaries the Large Generating Facility is located, and if permitted to do so by the relevant transmission tariffs, all necessary arrangements, including but not limited to those set forth in Article 7 and Article 8 of this LGIA, and remote Balancing Authority Area generator interchange agreements, if applicable, and the appropriate measures under such agreements, shall be executed and implemented prior to the placement of the Large Generating Facility in the other Balancing Authority Area.

  • Physical and Environmental Security DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.

  • Additional Requirements from Authorized Users An Authorized User may have distinct requirements that must be met by all individuals employed by or working for the Authorized User. The Contractor’s Staff Members will be expected to comply with these requirements as a condition of the placement.

Time is Money Join Law Insider Premium to draft better contracts faster.