Physical Security Sample Clauses

Physical Security. Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to:
AutoNDA by SimpleDocs
Physical Security. BNY Mellon will deploy perimeter security such as barrier access controls around its facilities processing or storing Customer Data. The ISP will include (i) procedures for validating visitor identity and authorization to enter the premises, which may include identification checks, issuance of identification badges and recording of entry purpose of visit and (ii) physical security policies for personnel, such as a “clean desk” policy. In accordance with its ISP and applicable law, BNY Mellon will install closed circuit television (“CCTV”) systems and CCTV recording systems to monitor and record access to controlled areas, such as data centers and server rooms.
Physical Security. IBM maintains physical security standards designed to restrict unauthorized physical access to IBM data centers. Only limited access points exist into the data centers, which are controlled by two-factor authentication and monitored by surveillance cameras. Access is allowed only to authorized staff that have approved access. Operations staff verifies the approval and issues an access badge granting the necessary access. Employees issued such badges must surrender other access badges and can only possess the data center access badge for the duration of their activity. Usage of badges is logged. Non- IBM visitors are registered upon entering on premises and are escorted when they are on the premises. Delivery areas and loading docks and other points where unauthorized persons may enter the premises are controlled and isolated.
Physical Security. You agree to implement and maintain reasonable physical security for all managed hardware and related devices in your physical possession or control. Such security measures must include (i) physical barriers, such as door and cabinet locks, designed to prevent unauthorized physical access to protected equipment, (ii) an alarm system to mitigate and/or prevent unauthorized access to the premises at which the protected equipment is located, (iii) fire detection and retardant systems, and (iv) periodic reviews of personnel access rights to ensure that access policies are being enforced, and to help ensure that all access rights are correct and promptly updated.
Physical Security. 2.1.3 Access Control;
Physical Security. The Contractor shall be responsible for safeguarding all government equipment, information and property provided for Contractor use or purchased by the Contractor under this task order.
Physical Security. ‌ Individual delivery orders will specify contractor rights of entry to and exit from government facilities as required for performance of work under this contract. Contractor employees shall comply with all applicable directives and policies regarding conduct of personnel and operation of the facility. The Government reserves the right to require Contractor personnel to "sign-in" upon entry to and "sign-out" upon exit from any government facility.‌ The Contractor shall secure and protect all Contractor-owned and Contractor employee- owned personal property and equipment brought into government facilities during performance of work under this contract. The Government shall not be held liable for loss of or damage to Contractor-owned or Contractor employee-owned personal property or equipment brought into government facilities. The Contractor shall remove any Contractor- owned or Contractor employee-owned personal property deemed inappropriate by the Government, for any reason, from the government facility in which it is found. Delivery orders will provide any restrictions regarding the need for contractor employees to be United States citizens, legal residents of the United States, or aliens authorized temporary employment in the United States before they can be employed under this contract. The delivery order will also provide instructions for any requirements for non-disclosure agreements such as the "Commitment to Protect Non-Public Information – Contractor Employee Agreement" form available at xxxxx://xxxx.xxx.xxx/aboutus/publicinfosecurity/acquisition/Documents/Nondisclosure.pdf‌‌ The Contractor will be held liable for any inappropriate disclosure of information/data by its employees or via any system used by the Contractor. Should the Contractor become aware of the need for additional safeguards, it must notify the COR immediately.
AutoNDA by SimpleDocs
Physical Security. Fit appropriate locks or other physical controls to the doors and windows of rooms where computers are kept. Physically secure unattended lap tops (for example, by locking them in a secure drawer or cupboard). Ensure you control and secure all removable media, such as removable hard-drives, CDs, floppy disks and USB drives, attached to business-critical assets. Destroy or remove all business-critical information from media such as CDs, and floppy disks before disposing of them. Ensure that all business-critical information is removed from the hard drives of any used computers before disposing of them. Store back-ups of business-critical information either off-site or in a fire and water-proof container.
Physical Security. Actions that prevent the loss or damage of Government property.
Physical Security. BNYM will deploy perimeter security such as barrier access controls around its facilities processing or storing Customer Data. The ISP will include (i) procedures for validating visitor identity and authorization to enter the premises, which may include identification checks, issuance of identification badges and recording of entry purpose of visit and (ii) physical security policies for personnel, such as a “clean desk” policy. In accordance with its ISP and applicable law, BNYM will install closed circuit television (“CCTV”) systems and CCTV recording systems to monitor and record access to controlled areas, such as data centers and server rooms.
Time is Money Join Law Insider Premium to draft better contracts faster.