SECURITY GATES Sample Clauses

SECURITY GATES. Where a car park is accessed by a security gate, that gate must be located at least 6 metres within the site from the street front property boundary.
AutoNDA by SimpleDocs
SECURITY GATES. Steel security gates: 2 Size 925mm x 1800mm high, as per door schedule. (G12) No 16 Carried Forward to Summary of Section No. 3 R Section No. 3 ALTERATIONS - 4 NO X 4 CLASSROOM Bill No. 9 Metalwork Zethu Consulting Services Amount
SECURITY GATES. Security gates are intended to be in the closed and locked position at all times- they will not have the ability to be propped open for any purpose. If you invite guests to meet you, you must arrange a time to meet them at the security gate, as they are not allowed entrance through the gate without your presence. While at The Quick Launch Clubhouse, the Clubhouse manager, staff, and security have the authority to request an identification form and to refuse service to anyone who disregards the Clubhouse rules.
SECURITY GATES. The Developer may establish one or more residential communities within the Project as a limited access community, with ingress/egress controlled by manned or unmanned security checkpoints. Responsibility for operation and maintenance of such security checkpoints may be transferred by the Developer to a Property Owner’s Association. While roads behind security gates will remain private, Developer acknowledges jurisdiction of the sheriff, the local fire department, and the need by the public utilities that serve the property and shall not interfere or in any way hinder either public utility activities on the Real Property regardless of whether such may a restricted community.
SECURITY GATES. The following in twenty four framed and welded mild steel security gates and fixing in position complete 89 Double gate in two equal leaves, each leaf formed of 50 x 25 x 1.6mm rectangular hollow section framing all round mitred and welded at angles with two 25 x 25 x 1.6mm mild steel square section 10mm diameter horizontal intermediate rails with ends welded to framing and with eight 19mm diameter rod vertical bars framed through intermediate rails with ends welded to framing, including 6 No x 100mm long butterfly hinges per gate - 3 No per leaf, four lever lockset and handles complete; size 2000 x 2185mm high overall No 2.00
SECURITY GATES. Visitors must pass through the library security gates when entering/leaving the library. All backpacks , book bags, purses, etc., are subject to inspection if the security alarm goes off. Selling: Selling any items, unless it is part of an approved library program, panhandling or soliciting money from patrons of the library or library staff. Sexual Misconduct: Patrons are prohibited from engaging in sexual misconduct or harassment, indecent exposure, explicit public displays of affection, viewing or printing illegal materials such as child pornography and other similar actions. Sleeping: Sleeping or laying down in the library. Smoking: Smoking of any type or using /displaying tobacco products, marijuana, vapor/vape pens or e- cigarette products in the library or on library property within 20 feet of an entrance is not allowed.
SECURITY GATES i. Standard security gates fitted to front door. FINISHES
AutoNDA by SimpleDocs
SECURITY GATES. 1. Thirty-six (36) lineal feet of security gates will be provided at the entry and exit at the servery area.
SECURITY GATES. On remote jobsites on out-of-town work when an Employee is required to report to any security guarded gate, he shall be paid mileage, in addition to subsistence, unless he lives within ten (10) miles from the jobsite, or unless the Employer furnishes transportation, and the Employee shall report to the security guarded gate at the established starting time and leave the gate at the established quitting time. ADDENDUM NO. 19

Related to SECURITY GATES

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Records Maintenance; Access Contractor shall maintain all financial records relating to this Contract in accordance with generally accepted accounting principles. In addition, Contractor shall maintain any other records, books, documents, papers, plans, records of shipments and payments and writings of Contractor, whether in paper, electronic or other form, that are pertinent to this Contract (“Records”) in such a manner as to clearly document Contractor's performance. Contractor acknowledges and agrees that Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to such financial records and other Records that are pertinent to this Contract, whether in paper, electronic or other form, to perform examinations and audits and make excerpts and transcripts. Contractor shall retain and keep accessible all such financial records and other Records for a minimum of 6 years, or such longer period as may be required by applicable law, following final payment and termination of this Contract, or until the conclusion of any audit, controversy or litigation arising out of or related to this Contract, whichever date is later.

Time is Money Join Law Insider Premium to draft better contracts faster.