ON-SITE CONTRACTOR ACCESS TO GOVERNMENT PROPERTY Sample Clauses

ON-SITE CONTRACTOR ACCESS TO GOVERNMENT PROPERTY. The Contractor shall be held responsible for Government Property, regardless of dollar value, when: • The BPA Call requires contractor personnel to be located on a Government site or installation; • The property utilized by contractor personnel is incidental to the place of performance; and, • The property used by the contractor remains accountable to the Government. Responsibility for government property shared by two or more contractors located in space shared by two or more contractors, shall be determined and documented by the contractors involved. In cases where the parties cannot reach agreement on shared responsibility, the matter will be referred to the NIH Property Officer for resolution.
AutoNDA by SimpleDocs
ON-SITE CONTRACTOR ACCESS TO GOVERNMENT PROPERTY. (Applicable to task orders that involve contractor staff working at a government site or installation and using government property) The Contractor shall be held responsible for Government Property, regardless of dollar value, when:

Related to ON-SITE CONTRACTOR ACCESS TO GOVERNMENT PROPERTY

  • DAMAGE TO GOVERNMENT PROPERTY A. In the event of loss, destruction, or damage to any System Agency or State of Texas owned, leased, or occupied property or equipment by Performing Agency or Performing Agency’s employees, agents, Subcontractors, and suppliers, Performing Agency shall be liable to System Agency and the State of Texas for the full cost of repair, reconstruction, or replacement of the lost, destroyed, or damaged property.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • GOVERNMENT-FURNISHED PROPERTY (1) The Government shall deliver to the Contractor the Government-furnished property described in this contract. The Government shall furnish related data and information needed for the intended use of the property. The warranties of suitability of use and timely delivery of Government-furnished property do not apply to property acquired or fabricated by the Contractor as contractor-acquired property and subsequently transferred to another contract with this Contractor.

  • DATA BREACH - REQUIRED CONTRACTOR ACTIONS Unless otherwise provided by law, in the event of a Data Breach, the Contractor shall:

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Additional Requirements from Authorized Users An Authorized User may have distinct requirements that must be met by all individuals employed by or working for the Authorized User. The Contractor’s Staff Members will be expected to comply with these requirements as a condition of the placement.

  • GOVERNMENT PROPERTY (a) Company may furnish to Seller property as may be required for performance of work under this Agreement, or have Seller acquire such property as mutually agreed. Title to property furnished or acquired shall vest in the Government, and hereafter be referred to as "Government property." If Seller purchases property for which it is entitled to be reimbursed as a direct item of cost, title shall pass to the Government upon delivery of the property to Seller. Title to all other property, the cost of which is reimbursable to Seller, shall pass to the Government upon the earliest of (1) issuance of property for use in performance, (2) processing property for use in performance, or (3) reimbursement of cost of property. Title shall not be affected by the incorporation or attachment to any property not owned by the Government, nor shall any Government property become a fixture or lose its identity because it is affixed to any realty.

  • Access to Customer Data You agree that we may, for the purposes of providing Maintenance and Customer Support and/or for the purpose of otherwise protecting the integrity of the Software, access and/or download your Customer Data on a limited basis.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Personal Protective Equipment (PPE 1. The Centers for Disease Control and Prevention (CDC) does not recommend personal protective equipment (PPE) beyond a face covering when interacting with asymptomatic individuals who are not known to have COVID-19.

Time is Money Join Law Insider Premium to draft better contracts faster.