Place of providing security guards Sample Clauses

Place of providing security guards. Export-Import Bank of India, 21st floor, Centre One Building, WTC, Cuffe Parade, Mumbai, 400 005.
AutoNDA by SimpleDocs

Related to Place of providing security guards

  • Security Guards Uniformed employees of the Company designated as Security Guards, whether full time or part time, who are assigned to a client work site for purposes of providing guard services, including but not limited to, the monitoring of entry and exit; ensuring security and protection of property and building; carrying out standing orders; crowd control; carrying out duties specifically pertaining to the client's contract; enforcing Provincial and Federal statutes; reporting of incidents; public and client relations; and other duties normally associated with security guard services, including strike duties where required.

  • Governing Law and Place of Jurisdiction The place of performance is Vienna. The contract and conditions precedent are governed by Austrian law. The conflict of law rules of international private law and UN CISG do not apply. The competent court for all disputes arising from this contract with enterprises as defined in Art. 1 of the Consumer Protection Act is Vienna 1020. In accordance with Art. 14 of the Consumer Protection Act, the competent court for claims against consumers is that of the consumer’s residence, habitual abode or place of employment.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Place of jurisdiction The parties agree that the place of jurisdiction shall be the location of the court responsible for Gunzenhausen. Signatures Client Udine , date 05.05.2021 Gunzenhausen, date 05/02/2021 Supplier Appendix 1 Pursuant to Art. 28 GDPR: List of Personal Data and the Purpose of Their Being Processed Types of data The following types and categories of data are the object of this additional agreement: • Personal master data • Communication data (e. g. telephone, email) • Contractual master data • Log data Affected People Those affected as a result of this additional agreement include: • The Client's customers and interested parties • The Client's customers and employees I. Confidentiality Appendix 2 of the Agreement Pursuant to Art. 28 GDPR: Technical and Organizational Measures in Accordance with Art. 32 GDPR and Amendments • Physical access control • Data center parks in Nürnberg, Xxxxxxxxxxx and Helsinki • electronic physical entry control system with log • high security perimeter fencing around the entire data center park • documented distribution of keys to employees and colocation customers for colocation racks (each Client only for his rack) • policies for accompanying and designating guests in the building • data center staff present 24/7 • video monitoring at entrances and exits; security door interlocking systems and server rooms • For people outside of the employment of Hetzner Online GmbH (data center visitors), entrance to the building is only permitted in the company of a Hetzner Online employee. • Monitoring • electronic physical access control system with log • video surveillance for all entrances and exits • Electronic access control • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes • server passwords, which, after the initial deployment, can only be changed by Client and are not known to the Supplier • The Client’s password for the administration interface is determined by the Client himself; the password must comply with predefined guidelines. In addition, the Client may employ two-factor authentication to further secure his account. • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares • Access is password-protected and only employees of the Supplier have access to the passwords. Passwords must meet a minimum length, and new passwords shall be changed on a regular basis. • Internal access control • for the Supplier's internal administration systems • The Supplier shall prevent unauthorized access by applying security updates regularly by using state of the art technology. • a revision-proof, compulsory process for allocating authorization for Supplier employees • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes • The responsibility for access control is incumbent upon the Client. • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares • The Supplier shall prevent unauthorized access by applying security updates regularly by using state of the art technology. • a revision-proof, compulsory process for allocating authorization for Supplier employees • Only the Client is responsible for transferred data/software with regard to security and updates. • Transfer control • Data center parks in Nürnberg, Xxxxxxxxxxx and Helsinki • Drives that were in operation on canceled servers will be swiped multiple times (deleted) in accordance with data protection polices upon termination of the contract. After thorough testing, the swiped drives will be reused. • Defective drives that cannot be securely deleted shall be destroyed (shredded) directly in the Xxxxxxxxxxx data center. • Isolation control • for the Supplier's internal administration systems • Data shall be physically or logically isolated and saved separately from other data. • Backups of data shall also be performed using a similar system of physical or logical isolation. • for principal commissions for the following unmanaged product lines: Dedicated Root Servers, Colocation Servers, Cloud Servers, and Storage Boxes • The Client is responsible for isolation control. • for principal commissions for the following managed product lines: Managed Servers, Web Hosting, and Storage Shares • Data shall be physically or logically isolated and saved separately from other data. • Backups of data shall also be performed using a similar system of physical or logical isolation. • Pseudonymization • The Client is responsible for pseudonymization.

  • Warranty/Guarantee 14.1.1 Developer shall obtain and preserve for the benefit of the District, manufacturer’s warranties on materials, fixtures, and equipment incorporated into the Work.

  • Law and Place of Jurisdiction This Pact is subject to Indian Law. The place of performance and jurisdiction is the seat of the BUYER.

  • Persons on Probation or Parole Grantee will:

  • Place of Jurisdiction and Applicable Law (1) The place of jurisdiction for any disputes arising from this Master Agreement and the individual agreement is Kassel, Germany. Disputes shall be ruled on by ordinary jurisdiction.

  • Applicable law, place of jurisdiction 14.1 This Agreement shall be subject to New York law.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

Time is Money Join Law Insider Premium to draft better contracts faster.