Security and Lighting Sample Clauses

Security and Lighting i. Fencing shall be provided between aircraft and non-aircraft areas to limit pedestrian and vehicular interference with aircraft movements, and to provide security for parked aircraft.
AutoNDA by SimpleDocs
Security and Lighting. The Agreement assumes all parking lot light standards in direct conflict with installation of photovoltaic shade structures/parking canopies will be removed by Design-Builder. The Agreement also assumes that the existing lighting circuits, for those removed parking lot light standards, can be re-used for photovoltaic shade structures/parking canopies lighting system and that those existing circuits have ample current carrying capacity to provide required lighting at shade structures/parking canopies, per jurisdictional code requirements. New lighting circuit installation is excluded from this proposal as well as any required timing circuit reconfiguration, lighting controllers, relays, or new panel boards. Lighting design and/or installation beyond the photovoltaic shade structures/parking canopies is not included in this proposal. The Scope of Work includes LED fixtures for lighting under structures structural shade structure/parking canopy bay at parking fixed tilt only. A security system is included as part of this proposal. No additional future security infrastructure is included as part of this proposal. Special Conditions The Scope of Work assumes existing islands in parking lot to remain at area of new carport structure. While special care will be taken to locate existing underground utilities (underground survey) and locate carport structures with minimum conflicts. Relocation of existing underground utilities due to carport foundations is not included. Scope of Work includes requirements for accessibility upgrades and accessibility design around the photovoltaic shade structure/parking canopy structures. Assumes parking lot layout has been reviewed and approved by DSA and built and closed at the DSA with certification with evidence provided to Design-Builder. Architectural enhancements to the photovoltaic shade structure/parking canopy structures or ground and roof arrays and mounting systems are not included in this Agreement. The Scope of Work assumes modifications and/or reconfiguration of the existing parking lots will not be required to accommodate installation of Design-Builder’s photovoltaic shade structure/parking canopy. The Scope of Work excludes any re-stripping of the parking lot/hard-court areas, unless specifically related to the construction of the photovoltaic parking canopies. The Scope of Work excludes design or installation of any required additional fire hydrants or fire protection apparatuses as required by local first respond...
Security and Lighting. Tenant shall be solely responsible for the security of the Leased Premises and shall provide sufficient security and lighting on the Lease Premises during operating hours to comply with all laws and ensure the safety of Participants.
Security and Lighting. CASA de Maryland shall take all reasonable steps to install, or have the entity in control of the location install, adequate outdoor security lighting and video cameras at entrances, parking areas and walkways between buildings. CASA de Maryland shall ensure that all doors and locks are in safe, functioning order.

Related to Security and Lighting

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Charge 14.1 In consideration of the Contractor agreeing to supply the Materials, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money).

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

  • Security and Offset Issuer hereby grants to NCPS and the Indemnified Parties a security interest in and lien upon the Escrow Funds (to the extent of Issuer’s rights thereto) to secure all obligations hereunder, and NCPS and the Indemnified Parties shall have the right to offset the amount of any compensation or reimbursement due any of them hereunder (including any claim for indemnification pursuant to Section 9 hereof) against the Escrow Funds (to the extent of Issuer’s rights thereto.) If for any reason the Escrow Funds available to NCPS and the Indemnified Parties pursuant to such security interest or right of offset are insufficient to cover such compensation and reimbursement, Issuer shall promptly pay such amounts to NCPS and the Indemnified Parties upon receipt of an itemized invoice.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Time is Money Join Law Insider Premium to draft better contracts faster.