Security Command Center Sample Clauses

Security Command Center. The Concessionaire shall establish a security command center (the Security Command Center) to be located at the Control Center. The Security Command Center shall coordinate with RTD's security command center and, in accordance with Law and otherwise as necessary in respect of police, fire and emergency services or any other Relevant Authority responsible for security, homeland security or emergency management. The Concessionaire shall maintain network connectivity between the Security Command Center and RTD's security command center that allows viewing of all Commuter Rail Network video systems at RTD's security command center.
AutoNDA by SimpleDocs
Security Command Center. Three (3) administrative offices • One central game day office • Restrooms • Four (4) holding cells • Courtroom • Roll-call room • BMS Control Rooms • Satellite Security Command Center on press level • Command Center to control access to loading dock and service tunnel o Stadium and Field Lighting Controls o Communications Systems o Fire Command Center o Public Address Systems o Monitors for Surveillance Camera Systems
Security Command Center. 24.1. Service Configuration. Customer acknowledges and agrees that (i) Customer must exclude individual resources by following the instructions described in the Documentation if Customer doesn’t want Security Command Center to scan Customer’s entire Organization, and (ii) Security Command Center will not detect all misconfigurations, vulnerabilities and threats in Customer’s Organization.
Security Command Center. The Security Command Center monitors the buildings Emergency Life Safety Systems and coordinates all building emergency responses. The Security Command Center is located in the Atrium near the Xxxxxx entrance and is staffed with trained professionals 24 hours a day, 365 days a year. GRATIOT Xxxxxxxx Xxxxxx Street Entrance Main Entrance CSO Desk Tenant Rules & Regulations Compuware Building

Related to Security Command Center

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Dewatering 4.7.1 Where a part of a site is affected by surface water following a period of rain, thus rendering some areas unsafe for productive work, consistent with the Employer’s obligations under the OH&S Act, all non- trades employees shall assist in ‘dewatering’ their own work site or area if it is so affected. Such work to be paid at single time rates. Productive work will continue in areas not so affected.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

Time is Money Join Law Insider Premium to draft better contracts faster.