Physical Entry Controls Sample Clauses

Physical Entry Controls. Supplier shall protect secure areas with appropriate entry controls to ensure only authorized personnel are allowed access. Supplier shall maintain visitor access logs for facilities where information systems reside.
AutoNDA by SimpleDocs
Physical Entry Controls. 24.1. The Data Processor shall ensure that secure areas are protected by appropriate entry controls to ensure that only authorized personnel are allowed access.
Physical Entry Controls. All secure areas are protected by appropriate entry controls to ensure that only authorised personnel are allowed access. These entry controls include: · Recording the date and time of entry and departure of visitors. All visitors are supervised, unless their access has been previously approved. All visitors are issued with instructions on emergency procedures and, where appropriate, on the security requirements of the area being visited; · Access to areas where sensitive information is processed or stored is controlled and restricted to authorised personnel only. Where appropriate, security access cards and/or PIN codes are used to authorise access and an audit trail of all access is maintained; · All employees, contractors, non-LGC users and all visitors are required to wear visible identification; · All access to secure areas by non-LGC support personnel is to be authorised and monitored; · Access rights to secure areas are revised regularly and updated when necessary. Version 005 It is the responsibility of the Head of Facilities to ensure that such controls are documented and enforced. Furthermore, it is the responsibility of all staff to notify immediately security personnel of unescorted visitors or anyone not wearing visible identification.

Related to Physical Entry Controls

  • TIA Controls If any provision of this Indenture limits, qualifies, or conflicts with another provision which is required to be included in this Indenture by the TIA, the required provision shall control.

  • Administrative Controls The Contractor must have the following controls in place:

  • Personal Controls a. Employee Training. All workforce members who assist in the performance of functions or activities on behalf of COUNTY in connection with Agreement, or access or disclose PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, must complete information privacy and security training, at least annually, at CONTRACTOR’s expense. Each workforce member who receives information privacy and security training must sign a certification, indicating the member’s name and the date on which the training was completed. These certifications must be retained for a period of six (6) years following the termination of Agreement.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Financial Controls At all times, the Charter School shall maintain appropriate governance and managerial procedures and financial controls which procedures and controls shall include, but not be limited to: (1) commonly accepted accounting practices and the capacity to implement them (2) a checking account; (3) adequate payroll procedures; (4) procedures for the creation and review of monthly and quarterly financial reports, which procedures shall specifically identify the individual who will be responsible for preparing such financial reports in the following fiscal year; (5) internal control procedures for cash receipts, cash disbursements and purchases; and (6) maintenance of asset registers and financial procedures for grants in accordance with applicable state and federal law.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Plan Controls The terms contained in the Plan are incorporated into and made a part of this Agreement and this Agreement shall be governed by and construed in accordance with the Plan. In the event of any actual or alleged conflict between the provisions of the Plan and the provisions of this Agreement, the provisions of the Plan shall be controlling and determinative.

  • Exchange Controls As a condition to this grant of Units, the Employee agrees to comply with any applicable foreign exchange rules and regulations.

  • Exchange Control Information Exchange control reporting is required for cash transactions exceeding AUD10,000 and for international fund transfers. If an Australian bank is assisting with the transaction, the bank will file the report on your behalf.

Time is Money Join Law Insider Premium to draft better contracts faster.