{"component": "clause", "props": {"groups": [{"size": 26, "samples": [{"hash": "hilk6sBcpkr", "uri": "/contracts/hilk6sBcpkr#physical-access", "label": "Voluntary Prekindergarten Provider Contract", "score": 28.9976711273, "published": true}, {"hash": "bIRca9qzi14", "uri": "/contracts/bIRca9qzi14#physical-access", "label": "Statewide Voluntary Prekindergarten Provider Contract", "score": 28.1794090271, "published": true}, {"hash": "cr4YNSQKHX3", "uri": "/contracts/cr4YNSQKHX3#physical-access", "label": "Statewide Voluntary Prekindergarten Provider Contract", "score": 25.7941455841, "published": true}], "snippet_links": [{"key": "the-office", "type": "clause", "offset": [25, 35]}, {"key": "early-learning", "type": "clause", "offset": [39, 53]}, {"key": "access-to-the-facilities", "type": "clause", "offset": [103, 127]}, {"key": "to-offer", "type": "definition", "offset": [144, 152]}, {"key": "vpk-program", "type": "definition", "offset": [157, 168]}, {"key": "normal-business-hours", "type": "clause", "offset": [176, 197]}], "snippet": "PROVIDER agrees to allow the Office of Early Learning and COALITION staff or sub-contractors immediate access to the facilities and spaces used to offer the VPK Program during normal business hours.", "hash": "2ccb7fca55ab09d7f6051c5e8df27c63", "id": 1}, {"size": 8, "samples": [{"hash": "7LbSYO0nZB1", "uri": "/contracts/7LbSYO0nZB1#physical-access", "label": "Call Off Contract", "score": 36.325138092, "published": true}, {"hash": "8xipgZIs9yP", "uri": "/contracts/8xipgZIs9yP#physical-access", "label": "Master Subscription Agreement", "score": 34.1420631409, "published": true}, {"hash": "5jG92AHu5uu", "uri": "/contracts/5jG92AHu5uu#physical-access", "label": "Data Processing Agreement", "score": 33.153049469, "published": true}], "snippet_links": [{"key": "access-to-facilities", "type": "clause", "offset": [36, 56]}, {"key": "all-access", "type": "clause", "offset": [81, 91]}, {"key": "periodically-reviewed", "type": "definition", "offset": [92, 113]}], "snippet": "Physical access, to include visitor access to facilities, must be restricted and all access periodically reviewed.", "hash": "b21ff702030211a78ef0dcc8d236ad5f", "id": 2}, {"size": 8, "samples": [{"hash": "4PIJnO3KtFx", "uri": "/contracts/4PIJnO3KtFx#physical-access", "label": "Terms of Use and Api License Agreement", "score": 28.3936290741, "published": true}, {"hash": "1tvFaybuYnP", "uri": "/contracts/1tvFaybuYnP#physical-access", "label": "Software as a Service Agreement", "score": 26.7837104797, "published": true}, {"hash": "8xPSQDuJc9T", "uri": "/contracts/8xPSQDuJc9T#physical-access", "label": "Software as a Service Agreement", "score": 26.7303218842, "published": true}], "snippet_links": [{"key": "wireless-devices", "type": "definition", "offset": [4, 20]}, {"key": "be-protected", "type": "clause", "offset": [27, 39]}, {"key": "physical-controls", "type": "clause", "offset": [58, 75]}, {"key": "risk-of-theft", "type": "clause", "offset": [92, 105]}, {"key": "unauthorized-use", "type": "definition", "offset": [107, 123]}], "snippet": "All wireless devices shall be protected using appropriate physical controls to minimize the risk of theft, unauthorized use, or damage;", "hash": "6f55e216f10d7c5d75f121a322fafaaf", "id": 3}, {"size": 8, "samples": [{"hash": "htMgq6GAFM3", "uri": "/contracts/htMgq6GAFM3#physical-access", "label": "Electronic Payment Processing Services Contract", "score": 32.0261154175, "published": true}, {"hash": "gmlMDoqJ9dk", "uri": "/contracts/gmlMDoqJ9dk#physical-access", "label": "Electronic Health Records System Contract", "score": 26.6208076477, "published": true}, {"hash": "499O8YK9SO2", "uri": "/contracts/499O8YK9SO2#physical-access", "label": "Contract", "score": 26.4620132446, "published": true}], "snippet_links": [{"key": "represents-and-warrants-that-it", "type": "clause", "offset": [11, 42]}, {"key": "during-the-term", "type": "clause", "offset": [63, 78]}, {"key": "at-all-times", "type": "definition", "offset": [87, 99]}, {"key": "protection-mechanisms", "type": "clause", "offset": [122, 143]}, {"key": "information-assets", "type": "definition", "offset": [152, 170]}, {"key": "information-technology", "type": "definition", "offset": [175, 197]}, {"key": "to-ensure", "type": "clause", "offset": [198, 207]}, {"key": "data-centers", "type": "clause", "offset": [275, 287]}, {"key": "appropriate-facility", "type": "definition", "offset": [293, 313]}, {"key": "entry-controls", "type": "clause", "offset": [314, 328]}, {"key": "access-to-systems", "type": "clause", "offset": [347, 364]}, {"key": "access-to-facilities", "type": "clause", "offset": [417, 437]}, {"key": "need-to-know", "type": "clause", "offset": [475, 487]}, {"key": "physically-secure", "type": "definition", "offset": [512, 529]}, {"key": "confidential-information-and", "type": "clause", "offset": [534, 562]}, {"key": "such-information", "type": "definition", "offset": [583, 599]}], "snippet": "Contractor represents and warrants that it has established and during the Term it will at all times enforce:\n(a) Physical protection mechanisms for all information assets and information technology to ensure such assets and technology are stored and protected in appropriate data centers;\n(b) Appropriate facility entry controls limiting physical access to systems that store or process data;\n(c) Processes to ensure access to facilities is monitored and is restricted on a \u201cneed to know\u201d basis;\n(d) Controls to physically secure all Confidential Information and to properly destroy such information when it is no longer needed.", "hash": "984b88c3296e442587b156cc48997625", "id": 4}, {"size": 7, "samples": [{"hash": "kvc7i8kXYXR", "uri": "/contracts/kvc7i8kXYXR#physical-access", "label": "Service Level Agreement (Sla)", "score": 22.8962898254, "published": true}, {"hash": "el0LyTKiGht", "uri": "/contracts/el0LyTKiGht#physical-access", "label": "Service Level Agreement (Sla)", "score": 22.6260528564, "published": true}, {"hash": "i1dxqApTQua", "uri": "/contracts/i1dxqApTQua#physical-access", "label": "Service Level Agreement (Sla)", "score": 19.9486656189, "published": true}], "snippet_links": [{"key": "in-order-to", "type": "clause", "offset": [0, 11]}, {"key": "services-requested", "type": "clause", "offset": [24, 42]}, {"key": "technology-services", "type": "definition", "offset": [76, 95]}, {"key": "the-client", "type": "clause", "offset": [126, 136]}, {"key": "work-space", "type": "clause", "offset": [149, 159]}, {"key": "the-office", "type": "clause", "offset": [161, 171]}, {"key": "services-representative", "type": "definition", "offset": [186, 209]}, {"key": "to-secure", "type": "clause", "offset": [233, 242]}, {"key": "and-return", "type": "clause", "offset": [276, 286]}, {"key": "original-condition", "type": "definition", "offset": [297, 315]}, {"key": "complete-the", "type": "clause", "offset": [391, 403]}, {"key": "security-form", "type": "clause", "offset": [407, 420]}, {"key": "business-unit", "type": "definition", "offset": [520, 533]}, {"key": "local-department", "type": "definition", "offset": [537, 553]}, {"key": "information-security-incidents", "type": "definition", "offset": [576, 606]}, {"key": "information-technology-resources", "type": "clause", "offset": [666, 698]}, {"key": "the-board", "type": "clause", "offset": [712, 721]}, {"key": "changes-to", "type": "clause", "offset": [829, 839]}, {"key": "theft-or-loss", "type": "clause", "offset": [875, 888]}, {"key": "use-of-passwords", "type": "clause", "offset": [920, 936]}], "snippet": "In order to perform the services requested, a representative from Office of Technology Services may need to physically access the client\u2019s office or work space. The Office of Technology Services representative will make every effort to secure the client\u2019s office or workspace and return it to its original condition. To report any incident regarding any unauthorized physical access, please complete the IT Security Form. Any information security incident should also be reported directly to leadership at your college, business unit or local department. Some of the types of information security incidents to be reported among others include: \u2022 Unauthorized use of information technology resources as stated in the Board\u2019s C.1.9- Policy and C.1.9.1-Procedure \u2022 Unauthorized use of Alamo Colleges systems or data. \u2022 Unauthorized changes to computers or software. \u2022 Equipment theft or loss. \u2022 Compromised or unauthorized use of passwords. \u2022 Report SPAM/Phishing to \u2587\u2587\u2587\u2587\u2587@\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.", "hash": "7779bb2d928b51021a46abc355897ba7", "id": 5}, {"size": 5, "samples": [{"hash": "i0qRS2IUct1", "uri": "/contracts/i0qRS2IUct1#physical-access", "label": "Managed Services Agreement", "score": 33.0276908875, "published": true}, {"hash": "hA3xSiCfS3K", "uri": "/contracts/hA3xSiCfS3K#physical-access", "label": "Managed Services Agreement", "score": 24.3278579712, "published": true}, {"hash": "io4WWD9vxNj", "uri": "/contracts/io4WWD9vxNj#physical-access", "label": "Managed Security Services Agreement", "score": 23.2991104126, "published": true}], "snippet_links": [{"key": "the-client", "type": "clause", "offset": [0, 10]}, {"key": "to-ensure", "type": "clause", "offset": [14, 23]}, {"key": "the-supplier-personnel", "type": "clause", "offset": [29, 51]}, {"key": "third-party-personnel", "type": "definition", "offset": [60, 81]}, {"key": "access-to-premises-and-equipment", "type": "clause", "offset": [140, 172]}, {"key": "the-services", "type": "definition", "offset": [187, 199]}, {"key": "in-accordance-with", "type": "clause", "offset": [232, 250]}, {"key": "terms-of-this-agreement", "type": "clause", "offset": [255, 278]}], "snippet": "The Client is to ensure that the Supplier Personnel and any Third Party Personnel nominated by the Supplier are given reasonable authorised access to premises and equipment in order that the Services may be delivered and maintained in accordance with the terms of this Agreement.", "hash": "19f3e67c8722c6dd1c74db7313224bcb", "id": 6}, {"size": 4, "samples": [{"hash": "k9xgSWKi2DV", "uri": "/contracts/k9xgSWKi2DV#physical-access", "label": "Data Privacy, Data Protection and Security Requirements", "score": 35.2350921631, "published": true}, {"hash": "13hhc3aLNWt", "uri": "/contracts/13hhc3aLNWt#physical-access", "label": "Data Privacy, Data Protection and Security Requirements", "score": 28.1238880157, "published": true}], "snippet_links": [{"key": "protection-mechanisms", "type": "clause", "offset": [13, 34]}, {"key": "information-assets", "type": "definition", "offset": [43, 61]}, {"key": "information-technology", "type": "definition", "offset": [66, 88]}, {"key": "to-ensure", "type": "clause", "offset": [89, 98]}, {"key": "appropriate-facility", "type": "definition", "offset": [171, 191]}, {"key": "entry-controls", "type": "clause", "offset": [201, 215]}, {"key": "access-to-systems", "type": "clause", "offset": [234, 251]}, {"key": "client-data", "type": "clause", "offset": [274, 285]}, {"key": "access-to-facilities", "type": "clause", "offset": [313, 333]}, {"key": "need-to-know", "type": "clause", "offset": [382, 394]}, {"key": "physically-secure", "type": "definition", "offset": [424, 441]}, {"key": "securely-destroy", "type": "definition", "offset": [465, 481]}, {"key": "such-information", "type": "definition", "offset": [482, 498]}, {"key": "in-accordance-with", "type": "clause", "offset": [527, 545]}, {"key": "this-exhibit", "type": "definition", "offset": [546, 558]}, {"key": "the-agreement", "type": "clause", "offset": [563, 576]}], "snippet": "(i) physical protection mechanisms for all information assets and information technology to ensure such assets and technology are stored and appropriately protected;\n(ii) appropriate facility and room entry controls to limit physical access to systems that store or Process Client Data;\n(iii) processes to ensure access to facilities and rooms are monitored and is restricted on a \u201cneed to know\u201d basis; and\n(iv) controls to physically secure all Client Data and to securely destroy such information when it is no longer needed in accordance with this Exhibit and the Agreement.", "hash": "5912c837bf6361c1187550fe4105a606", "id": 7}, {"size": 3, "samples": [{"hash": "ClDhGRWDEe", "uri": "/contracts/ClDhGRWDEe#physical-access", "label": "Exhibition Design Services Agreement", "score": 20.3305950165, "published": true}, {"hash": "gsj593MPtE9", "uri": "/contracts/gsj593MPtE9#physical-access", "label": "Exhibition Design Services Agreement", "score": 20.0609169006, "published": true}, {"hash": "51eqdp5QBUH", "uri": "/contracts/51eqdp5QBUH#physical-access", "label": "Exhibition Design Services Agreement", "score": 19.7446956635, "published": true}], "snippet_links": [], "snippet": "Entrances/Exits", "hash": "cb19ec55e6e609510a9c9e6d74cbe01d", "id": 8}, {"size": 3, "samples": [{"hash": "9QON0Uh9rZK", "uri": "/contracts/9QON0Uh9rZK#physical-access", "label": "Master Services Agreement", "score": 23.8090343475, "published": true}, {"hash": "kQn4YCnPkCS", "uri": "/contracts/kQn4YCnPkCS#physical-access", "label": "Master Services Agreement", "score": 23.4750175476, "published": true}, {"hash": "jpdQmd2cnd4", "uri": "/contracts/jpdQmd2cnd4#physical-access", "label": "Master Services Agreement", "score": 23.3956203461, "published": true}], "snippet_links": [{"key": "security-systems", "type": "definition", "offset": [37, 53]}, {"key": "access-to-the-facility", "type": "clause", "offset": [65, 87]}, {"key": "common-space", "type": "definition", "offset": [99, 111]}, {"key": "key-cards", "type": "clause", "offset": [166, 175]}, {"key": "tenant-data", "type": "clause", "offset": [252, 263]}, {"key": "data-center", "type": "clause", "offset": [279, 290]}, {"key": "customer-will", "type": "clause", "offset": [372, 385]}, {"key": "private-data", "type": "definition", "offset": [405, 417]}, {"key": "a-day", "type": "definition", "offset": [441, 446]}, {"key": "a-week", "type": "definition", "offset": [455, 461]}, {"key": "unless-otherwise-specified-in", "type": "clause", "offset": [463, 492]}, {"key": "ordering-document", "type": "definition", "offset": [496, 513]}, {"key": "customer-shall", "type": "clause", "offset": [520, 534]}, {"key": "to-customer", "type": "clause", "offset": [547, 558]}, {"key": "in-the-case", "type": "clause", "offset": [588, 599]}, {"key": "ensure-security", "type": "clause", "offset": [629, 644]}, {"key": "prior-express-consent", "type": "definition", "offset": [651, 672]}, {"key": "by-electronic-mail", "type": "clause", "offset": [684, 702]}, {"key": "remote-hands-services", "type": "clause", "offset": [737, 758]}, {"key": "case-of-emergency", "type": "definition", "offset": [772, 789]}, {"key": "for-cost", "type": "definition", "offset": [815, 823]}, {"key": "access-cards", "type": "definition", "offset": [840, 852]}], "snippet": "INAP has installed and will maintain security systems to control access to the Facility and Shared Common Space (as defined herein). INAP shall provide Customer with key cards or other such technology to access the Facility, Shared Common Space, multi-tenant data halls, and the Data Center Suite, as appropriate. All such access shall be recorded and maintained by INAP. Customer will have access to the private Data Center Suite, 24-hours a day, 7-days a week, unless otherwise specified in an Ordering Document. Only Customer shall have access to Customer\u2019s Data Center Suite, except, in the case of INAP, for maintenance, to ensure security, with prior express consent (including by electronic mail), upon standing consent (e.g. for Remote Hands Services), and in the case of emergency. Customer is responsible for cost to replace lost access cards.", "hash": "409eee551a86a889db81820b4ac1de9d", "id": 9}, {"size": 3, "samples": [{"hash": "gdru1hvZ96m", "uri": "/contracts/gdru1hvZ96m#physical-access", "label": "Data Processing Agreement", "score": 35.4034957886, "published": true}, {"hash": "dc4SzNAaAJh", "uri": "/contracts/dc4SzNAaAJh#physical-access", "label": "Data Processing Agreement", "score": 35.2360343933, "published": true}, {"hash": "dn8lUgGivOF", "uri": "/contracts/dn8lUgGivOF#physical-access", "label": "Data Processing Agreement", "score": 35.1549263, "published": true}], "snippet_links": [{"key": "services-use", "type": "clause", "offset": [7, 19]}, {"key": "security-of", "type": "clause", "offset": [56, 67]}, {"key": "access-controls", "type": "clause", "offset": [108, 123]}, {"key": "security-guards", "type": "definition", "offset": [132, 147]}, {"key": "video-cameras", "type": "clause", "offset": [173, 186]}, {"key": "security-controls", "type": "definition", "offset": [239, 256]}, {"key": "exit-points", "type": "definition", "offset": [361, 372]}, {"key": "fire-detection", "type": "clause", "offset": [376, 390]}, {"key": "emergency-power", "type": "definition", "offset": [444, 459]}], "snippet": "\u2587\u2587\u2587\u2587\u2587\u2587 Services use IaaS vendors that validate physical security of relevant facilities using the following access controls: \u2022 24x7 Security guards; \u2022 Internal and external video cameras; \u2022 Formal access and visitor procedures; \u2022 Entrance security controls, such as badge readers, biometric identification mechanisms, and/or physical locks; \u2022 Alarmed emergency exit points; \u2022 Fire detection alarms and protection equipment; and \u2022 Redundant and emergency power sources.", "hash": "fc188f1bc834b86f6bd467ca51decddd", "id": 10}], "next_curs": "ClgSUmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjQLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhhwaHlzaWNhbC1hY2Nlc3MjMDAwMDAwMGEMogECZW4YACAA", "clause": {"title": "Physical Access", "size": 144, "children": [["motion", "Motion"], ["conduct", "Conduct"], ["insurance", "Insurance"], ["state-staff-physical-access-restricted", "State Staff Physical Access Restricted"], ["access-after-hours", "Access after Hours"]], "parents": [["parties-and-terms-of-contract", "Parties and Terms of Contract"], ["miscellaneous", "Miscellaneous"], ["competent-supervisory-authority", "Competent supervisory authority"], ["logical-security", "Logical Security"], ["telecommunication-and-network-security", "Telecommunication and Network Security"]], "id": "physical-access", "related": [["physical-access-control", "Physical Access Control", "<strong>Physical Access</strong> Control"], ["system-access", "System Access", "System Access"], ["work-access", "WORK ACCESS", "WORK ACCESS"], ["physical-exams", "Physical Exams", "Physical Exams"], ["eu-access", "EU Access", "EU Access"]], "related_snippets": [], "updated": "2025-07-24T04:27:57+00:00", "also_ask": [], "drafting_tip": null, "explanation": "The Physical Access clause defines the conditions under which one party is permitted to enter or use another party\u2019s physical premises or facilities. Typically, it outlines who may access the property, the purposes for which access is granted (such as inspections, maintenance, or audits), and any restrictions or requirements, such as advance notice or supervision. This clause serves to protect the property owner\u2019s security and privacy while enabling necessary activities, ensuring that access is controlled and only granted for legitimate, agreed-upon reasons."}, "json": true, "cursor": ""}}