Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.
Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.
Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.
SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.
Security Agreements Signed original security agreements, assignments, financing statements and fixture filings (together with collateral in which the Bank requires a possessory security interest), which the Bank requires.
Security Clearance 6.7.1 Where specified by the Authority or the Contract user, the Supplier shall be responsible for ensuring that all Staff are security cleared to the level required by the Security Requirements not less than 5 Working Days before such person begins to perform the Services. If the Authority is responsible for applying for security clearance for Staff pursuant to this Clause 6.7.1, the Supplier shall provide a completed security clearance application form for such members of Staff to the Authority not less than 30 days before such members of Staff begin to perform the Services.
Security Clearances A. The General Contractor is to supply the Department of Corrections with full names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted a minimum of two (2) weeks prior to access to the site. The Department of Corrections has final word on who will be permitted access to the site. A form for this purpose is attached for your use.
Security Interests Absolute All rights of the Secured Parties and all obligations of the Debtors hereunder, shall be absolute and unconditional, irrespective of: (a) any lack of validity or enforceability of this Agreement, the Debentures or any agreement entered into in connection with the foregoing, or any portion hereof or thereof; (b) any change in the time, manner or place of payment or performance of, or in any other term of, all or any of the Obligations, or any other amendment or waiver of or any consent to any departure from the Debentures or any other agreement entered into in connection with the foregoing; (c) any exchange, release or nonperfection of any of the Collateral, or any release or amendment or waiver of or consent to departure from any other collateral for, or any guarantee, or any other security, for all or any of the Obligations; (d) any action by the Secured Parties to obtain, adjust, settle and cancel in its sole discretion any insurance claims or matters made or arising in connection with the Collateral; or (e) any other circumstance which might otherwise constitute any legal or equitable defense available to a Debtor, or a discharge of all or any part of the Security Interests granted hereby. Until the Obligations shall have been paid and performed in full, the rights of the Secured Parties shall continue even if the Obligations are barred for any reason, including, without limitation, the running of the statute of limitations or bankruptcy. Each Debtor expressly waives presentment, protest, notice of protest, demand, notice of nonpayment and demand for performance. In the event that at any time any transfer of any Collateral or any payment received by the Secured Parties hereunder shall be deemed by final order of a court of competent jurisdiction to have been a voidable preference or fraudulent conveyance under the bankruptcy or insolvency laws of the United States, or shall be deemed to be otherwise due to any party other than the Secured Parties, then, in any such event, each Debtor’s obligations hereunder shall survive cancellation of this Agreement, and shall not be discharged or satisfied by any prior payment thereof and/or cancellation of this Agreement, but shall remain a valid and binding obligation enforceable in accordance with the terms and provisions hereof. Each Debtor waives all right to require the Secured Parties to proceed against any other person or entity or to apply any Collateral which the Secured Parties may hold at any time, or to marshal assets, or to pursue any other remedy. Each Debtor waives any defense arising by reason of the application of the statute of limitations to any obligation secured hereby.
Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.