Security Vetting Sample Clauses

Security Vetting. 13.3.1 The Supplier shall undertake Baseline Personnel Security Standard (BPSS) pre- employment checks, as stated in the HMG Personnel Security Controls, for all Supplier Personnel that have access to Network Rail premises or Network Rail IT networks.
AutoNDA by SimpleDocs
Security Vetting. 20.3.1 The Service Provider is responsible for the ensuring that all their employees and any sub-contractors, agents etc. who are due to work at the Premises, for longer than four weeks in duration in the delivery of the Contract, whether in a continuous period, or over the duration of the Contract, have been security vetted to Basic level, as defined by Disclosure Scotland1. 1 Please note that Disclosure Scotland is the agency that all security vetting providers will approach to undertake the security vetting.
Security Vetting. We have extensive experience of bringing linguists up to the required levels of security across a number of areas. In the NHS setting all our interpreters are CRB checked, for the CJS work all interpreters are enhanced CRB checked and then vetted and in the private sector we have linguists that are SS and other security clearance for sensitive defence work. We therefore have a range of experience of bringing linguists up to the security standard required by different organisations.
Security Vetting. NUS shall within one (1) week of execution of this Project Agreement submit to DSO for security vetting, the names and particulars such as National Registration Identity card and previous security clearance reference, of all personnel, including the personnel of its sub-contractor who will be involved in the performance of the Project in this Project Agreement.
Security Vetting. 16.1 The PROJECT MANAGER is responsible for the ensuring that all their employees and any sub-contractors, agents etc. who are due to work at the Premises, for longer than four weeks in duration in the delivery of the Contract, whether in a continuous period, or over the duration of the Contract, have been security vetted to Basic level, as defined by Disclosure Scotland1. 1 Please note that Disclosure Scotland is the agency that all security vetting providers will approach to undertake the security vetting.

Related to Security Vetting

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

Time is Money Join Law Insider Premium to draft better contracts faster.