Office Security Sample Clauses

Office Security. The Administration shall implement procedures and regulations to safeguard the security of each faculty member’s office and files. The faculty member shall have sole access to his desk and office files, but the College locksmith may maintain duplicate keys for replacement and emergency purposes. However, if the faculty member's office is entered for non-emergency purposes, the faculty member shall be notified.
AutoNDA by SimpleDocs
Office Security. The institution will furnish the faculty unit member a lockable desk or a lockable file. The administration will provide faculty unit members with access to secure physical or virtual repositories for student records, research data or similar records for which they responsible under law, regulation or policy. If an office is assigned to a faculty unit member, the institution will provide security for each faculty unit member's office by means of a lockable door. The lockable furniture and office space are provided to permit faculty unit members to control access to confidential student records, course materials and research documents, materials, specimens or equipment by unauthorized students and others who have no authority to access the locked areas. Ordinarily, administrators will have access to a faculty unit member's office spaces or locked furniture only with the authorization of the faculty unit member. In exceptional circumstances, when the faculty unit member is unavailable and is not expected to return in time to provide necessary assistance or cannot be reached to provide authorization, an administrator may enter the space for some routine administrative purpose, for instance, to obtain a file that would be provided as a matter of course. Administrators may also enter without notice when there are reasonable grounds for suspecting that the entry will turn up evidence that the faculty unit member is guilty of work-related misconduct.
Office Security. The parties agree that faculty offices are assigned to the faculty member by the College, and the College recognizes that a certain level of privacy accompanies this arrangement. Therefore, another College staff member will not enter a faculty member's office without permission from, or prior arrangement with, the faculty member unless there is an emergency or compelling reason to do so. The College will continue to provide security personnel for protection of College facilities. Access to faculty members’ desks, office files, computer files, voice-mail files, and e-mail files shall be only with the authorization of the appropriate faculty members, barring unusual and extenuating circumstances. The parties agree that alleged misconduct on the part of a faculty member constitutes an unusual circumstance or compelling reason that may require the College to authorize personnel other than the faculty member to access such faculty member’s office, desk or files. Information obtained from voice-mail, e-mail or computer files in the course of college-wide network maintenance shall be treated as confidential.
Office Security. The College shall safeguard the security of College property including offices, equipment and files.
Office Security. Upon request to the MLA, an on-site assessment must be completed by a qualified authority with a view to increase security measures to ensure the safety of Employees. Such security measures may include but are not limited to panic buttons, safety training, entry buzzers, etc.
Office Security. The Agency, in coordination with the General Services Administration or other federal agencies as appropriate, shall use its best efforts to ensure that each Agency office is in a building with security facilities that meet or exceed applicable federal government-wide standards. Employees shall access the buildings in accordance with Departmental Regulations in effect at the time.

Related to Office Security

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Performance Security If our Tender is accepted, we commit to obtain a performance security in accordance with the Tendering document;

Time is Money Join Law Insider Premium to draft better contracts faster.