Parking Access and Revenue Control System Sample Clauses

Parking Access and Revenue Control System. (PARCS) and sub-systems. The Contractor shall operate the PARCS at the Airport as part of the Operating Equipment. The Contractor shall be responsible for the maintenance activities associated with the PARCS as defined by the Authority in Exhibit B-3. The Contractor shall train its employees in the proper use of the Authority’s PARCS. The PARCS includes software and data contained therein that was developed at the Authority’s expense for use in the Contractor’s operations that is proprietary to the Authority. The Contractor shall not copy, assign, sell, or disclose the software or use the software for purposes that are not authorized by this Contract, except with the prior written approval of the Authority. At any time during the Contract Term, the Authority reserves the right to modify, and/or replace all or any part of the PARCS system at the Airport. Any such modification or replacement of the PARCS system by the Authority shall not alter or cancel the Contractor’s responsibility for the system’s operation and/or maintenance as provided herein unless otherwise provided in writing by the Authority. During the Contract Term the Authority may consolidate the system at Xxxxxx Xxxxxx Washington National and Washington Dulles International Airports to provide a single consolidated system remotely hosted through the Authority’s data center; the Contractor shall support the Authority’s implementation efforts as directed by the Authority, which may require the Contractor to manage and operate certain consolidated parking systems for both airports.
AutoNDA by SimpleDocs
Parking Access and Revenue Control System or PARCS shall mean the mechanical, electronic, and computerized equipment provided by the County from time to time, to control and record entrances and exits from the AEP, as well as other Airport parking facilities, which may include, but not be limited to, loop detectors, gate arms, ticket dispensers, cash registers, fee indicators, computerized data management systems card access systems, license plate inventory system ("LPI"), license plate recognition system ("LPR"), pay-on-foot terminals ("POF"), SunPass Plus System, parking reservation system, proximity card system, software and license, and any other administrative or management systems related to the PARCS.
Parking Access and Revenue Control System. Concessionaire shall be responsible to operate and maintain and ensure the accuracy and integrity of the Parking Access and Revenue Control System (Amano System) in its operation of the Public Parking Concession at the Airport. Concessionaire shall develop and implement a written preventive maintenance schedule and procedure to ensure the reliable and continuous performance of all equipment contained in such Parking Access and Revenue Control System. The schedule and procedures must be submitted to the SFRAA for written approval prior to the Effective Date of this Concession Agreement and whenever any modifications to the schedule or procedures are made. In addition, Concessionaire shall be responsible for all necessary repairs to the Parking Access and Revenue Control System. The SFRAA reserves the right to be present during such maintenance and repair procedures, and to perform periodic inspections to assure all Parking Access and Revenue Control System equipment is functioning properly and adequate safeguards appear to be in place. Concessionaire shall maintain a log of all such procedures including date, time, identity of equipment, and name of staff member or contractor who performed the procedure. Cashiers shall not be permitted to perform repair or maintenance to any portion of the Parking Access and Revenue Control System, including but not limited to cash registers, ticket dispensers, etc., unless otherwise approved in writing by the SFRAA.

Related to Parking Access and Revenue Control System

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • CONTROL SYSTEM (a) SELLER shall provide and maintain a quality control system to an industry recognized Quality Standard and in compliance with any other specific quality requirements identified in this Contract.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Emergency Operator Access Registry Operator shall provide bulk access to the zone files for the TLD to the Emergency Operators designated by ICANN on a continuous basis in the manner ICANN may reasonably specify from time to time.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Compliance Control Services (1) Support reporting to regulatory bodies and support financial statement preparation by making the Fund's accounting records available to the Trust, the Securities and Exchange Commission (the “SEC”), and the independent accountants.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

Time is Money Join Law Insider Premium to draft better contracts faster.