Security guards management Sample Clauses

Security guards management. SELECTION The security guards must be employed by the Contractor. The Contractor shall be and shall remain the employer of its staff throughout the duration of this contract and their staff shall not have a work contract with EASO. The Contractor shall maintain personnel files, which include the police background check on all of its personnel assigned to perform under the Contract. These files shall be maintained by the Contractor and are subject to inspection by the EASO Head of Administration or his/her designated representatives at any time. The contractor shall provide the police conduct and criminal record of the staff that it will provide services to EASO. This information shall be provided upon commencement of the contract.
AutoNDA by SimpleDocs

Related to Security guards management

  • Security Guards Uniformed employees of the Company designated as Security Guards, whether full time or part time, who are assigned to a client work site for purposes of providing guard services, including but not limited to, the monitoring of entry and exit; ensuring security and protection of property and building; carrying out standing orders; crowd control; carrying out duties specifically pertaining to the client's contract; enforcing Provincial and Federal statutes; reporting of incidents; public and client relations; and other duties normally associated with security guard services, including strike duties where required.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • Records Management Records the Provider must keep

  • Pain Management Inpatient rehabilitation for Pain Management is excluded.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Crisis Management 1. The Parties reaffirm their commitment to cooperating in promoting international peace and stability.

  • Access Management The Engineer shall coordinate and evaluate access management within the project limits in accordance with the latest State Access Management Manual or as directed by the State.

  • Warranty/Guarantee 14.1.1 Developer shall obtain and preserve for the benefit of the District, manufacturer’s warranties on materials, fixtures, and equipment incorporated into the Work.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

Time is Money Join Law Insider Premium to draft better contracts faster.