Security Scanners Sample Clauses

Security Scanners. Notwithstanding anything to the contrary set forth in this Lease, during the period of time that Tenant concurrently leases under this Lease all of the floors that are served exclusively by any set of passenger elevators of the Building (e.g. the Building’s low-rise passenger elevators exclusively serve floors 2-17; the Building’s mid-rise passenger elevators exclusively serve floors 18-29; and the Building’s high-rise passenger elevators exclusively serve floors 29-38) (collectively, the “Exclusive Elevators”), Tenant may, at its sole cost and expense, and otherwise in compliance with the provisions of this Lease (including, without limitation, the provisions of this Article 8), install and maintain security scanners in the main lobby of the Building to monitor access to such Exclusive Elevators (collectively, the “Security Scanners”). The design, location and specifications of the Security Scanners shall be subject to Landlord’s prior approval, which shall not be unreasonably withheld so long as the Security Scanners (i) are compatible with the Building’s security systems, (ii) do not cause a Design Problem (except that for purposes of this Section 8.6, the term “Design Problem” shall not include clause (iii) of Section 8.1 above), and (iii) do not affect Landlord’s ability to operate the Building on a commercially reasonable basis. Tenant shall not be charged any rent for use of the space where the Security Scanners are installed. Tenant shall reimburse Landlord, within thirty (30) days after receipt of invoice from Landlord, for any actual, documented and reasonable out-of-pocket costs incurred by Landlord in connection with Landlord’s and its consultants’ review of the plans and specifications for the Security Scanners and/or the installation, use and/or operation by Tenant of the Security Scanners. Tenant shall be solely responsible, at Tenant’s sole cost and expense, for the monitoring, operation, repair and maintenance of the Security Scanners, and neither Landlord nor the security personnel employed by Landlord shall have any responsibility with respect thereto (including, without limitation, the responsibility to monitor and/or prevent access to any Exclusive Elevators by any persons entering through the Security Scanners or to respond to the triggering of any sensors indicating a breach of the Security Scanners). Tenant shall provide Landlord with key cards for the Security Scanners installed by Tenant so that Landlord and Landlord’s management ...
AutoNDA by SimpleDocs
Security Scanners. (We strongly urge that you stress to the group not to bring or wear anything that can slow the process of getting through security scanners. It can be a very long and frustrating entry into every building if there are those wearing big jewelry, steel toed shoes, wallets with big chains, electronic devices, etc. Planning ahead can help to eliminate some of the security scanner stress!) Cell phones (Okay, this has nothing to do with additional security, although you must turn them off in many buildings now and they make going through security a hassle, we just thought it was a good place to bring up the subject! While it is very common for everyone on tour to have one these days, it sure makes things much more complicated when a student or parent is on the phone while the group is being addressed by the tour leader or guide. Our only request is that you discuss this with your group prior to the tour. Possible suggestions would be that if students must bring one on the tour that they turn them off during the day so they can be focused on learning and seeing the sites, and if adults must carry-on business on the phone during the tour that they step away from the group knowing that they are responsible to catch up with the group when the phone call ends. Cell phones are a great way to stay in touch, but can be a big disruption if not handled properly.) WASHINGTON, D.C. TRIP To bring, or not to bring? Due to limited motorcoach space, each participant’s luggage is restricted to one suitcase and one small carry-on bag. All luggage must be clearly marked with the trip participant’s name and address. WHAT TO BRING: Clothes for 5 days (check weather) Toiletries Comfortable walking shoes Hat Sunscreen Light jacket Camera (with plenty of digital storage space) Pillow and light blanket (for sleeping on the bus) Food money Spending money Bible (don’t leave home without it) Small backpack Water bottle Good attitude! OPTIONAL DURING THE BUS RIDE: Appropriate books/magazines/games for bus ride Personal mp3 player w/ headphones* (no movies or movie players) *Please bring music that is appropriate for a Christian school trip. Inappropriate music will be taken and held until we return to Tallahassee. Lyrics that contain cursing or unbiblical themes or phrases are inappropriate. CCS personnel reserve the right to confiscate any media or electronic device deemed inappropriate or used inappropriately.

Related to Security Scanners

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!