Access and Security definition

Access and Security. Agreement shall mean the Access and Security Agreement dated as of January 1, 2001, between Harvard, and Pottstown, on the one hand, and General Motors Corporation, on the other hand, and each of the three Access and Security Agreements dated as of the same date between Harvard and Xxxxx-Albion, on the one hand, and General Motors Corporation, on the other hand, relating to the Xxxxx-Albion facility in Jackson, Michigan, the Trim-Trend facility in Bryan, Ohio, and the Trim-Trend facility in Spencerville, Ohio.
Access and Security above, as well as the requirements relating to security, traffic and parking in the public domain premises of SNCF RÉSEAU, described in the Special Conditions, shall be the liability of the BENEFICIARY who consequently waives all recourse against SNCF RÉSEAU, its respective agents and its possible insurers. He undertakes to indemnify them and to guarantee them against any action that may be brought against them.
Access and Security. Agreement shall mean the Access and Security Agreement dated as of January 1, 2001, between Harvard and Pottstown, on the one hand, and General Motors Corporation, on the other hand, each of the three Access and Security Agreements dated as of the same date between Harvard and Xxxxx-Albion, on the one hand, and General Motors Corporation, on the other hand, relating to the Xxxxx-Albion facility in Jackson, Michigan, the Trim-Trends facility in Bryan, Ohio, and the Trim-Trends facility in Spencerville, Ohio, and the Access and Security Agreement referred to in the Visteon/American Axle Participating Customer Agreement and each other access and security or similar agreement with other Participating Customers of any Borrower facility entered into with the prior written consent of the Lenders and the Junior Lien Lender in connection with a Participating Customer Agreement with such customer.

Examples of Access and Security in a sentence

  • Access and Security The VAMS system is owned by CDC and hosted on Salesforce and AWS FedRAMP Moderate Hosting environments, which have undergone GSA evaluation and accreditation through a third-party assessment organization (3PAO).

  • Access and Security You agree that you are responsible for the confidentiality and use of your Login ID and password.

  • For additional assistance with eAuth ID’s visit the Training and Resource Library on LINC (xxxxx://xxx.xx.xxxx.xxx/resources/usda-linc-training-resource-library ) and locate the System Access and Security Guide.

  • Access and Security The VaccineFinder provider portal is being developed and maintained by Boston Children’s Hospital HealthMap in partnership with CDC and Castlight.

  • Options include: • Cross-jurisdictional data exchange and queries • Multijurisdictional providers sharing data with multiple IISs via a central connection • Routing of VAMS data to the appropriate IIS • IISs reporting to the DCH Access and Security The IZ Gateway system is owned by CDC and hosted on the APHL Informatics Messaging System (AIMS).

  • Terms and Conditions Access and Security Access to Online Statements and Notices will be by means of Your Login Credentials for the Service.

  • Access and Security The DCH is owned by HHS and hosted within an Oracle Cloud Infrastructure (OCI) U.S. Government Cloud tenancy.

  • Access and Security IZ Data Lake: Is owned and operated by CDC and is hosted in CDC’s FedRAMP Azure Infrastructure.

  • As provided in Section 2.m above (Access and Security) you authorize us to act on transaction instructions initiated under the access credentials of an authenticated Subuser, just as if it was initiated under your credentials.

  • Maintenance Supervisor contact info is listed on the Facilities Management website at: xxxx://xxx.xxxxxxxxxxxxx.xxx/749/Team-Directory Operations Section Access Control/CCTV – Facilities provides a range of security services through or Facilities Access and Security Team (FAST), the most common of which is access control.

Related to Access and Security

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Privacy and Security Laws means applicable Laws that govern the Processing, privacy or security of Personal Information.

  • Loan and Security Agreement “thereunder”, “thereof” or similar words referring to the Loan Agreement shall mean and be a reference to this Agreement and (b) each reference in the Financing Agreements to a “Note” or “Revolving Credit Note” shall mean and be a Revolving Credit Note as defined in this Agreement.

  • Information Privacy and Security Laws means all applicable laws concerning the privacy, data protection, transfer, or security of Personal Confidential Information, including, to the extent applicable, the General Data Protection Regulation (EU), other state, and federal, data security laws, data breach notification laws, and consumer protection laws.

  • Guaranty and Security Agreement means a guaranty and security agreement, dated as of even date with the Agreement, in form and substance reasonably satisfactory to Agent, executed and delivered by each of the Borrowers and each of the Guarantors to Agent.

  • Pledge and Security Agreement means the Pledge and Security Agreement executed and delivered by the Borrower and each Guarantor on the Closing Date in form and substance acceptable to the Initial Lender and the Collateral Agent, as it may be amended, supplemented, restated or otherwise modified from time to time. For the avoidance of doubt, the terms of the “Pledge and Security Agreement” shall include the terms of all Applicable Annexes (as defined in the Pledge and Security Agreement).

  • Loaned Security means any “security” which is delivered as a Loan under a Securities Loan Agreement; provided that, if any new or different security shall be exchanged for any Loaned Security by recapitalization, merger, consolidation, or other corporate action, such new or different security shall, effective upon such exchange, be deemed to become a Loaned Security in substitution for the former Loaned Security for which such exchange was made.

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Permitted Security means any Security:

  • Guarantee and Security Agreement means that certain Guarantee, Pledge and Security Agreement, dated as of the Effective Date, among the Borrower, the Subsidiary Guarantors, the Administrative Agent, each holder (or a representative, agent or trustee therefor) from time to time of any Secured Longer-Term Indebtedness, and the Collateral Agent.

  • Conditional Access System means any technical measure and/or arrangement whereby access to a protected radio or television broadcasting service in intelligible form is made conditional upon subscription or other form of prior individual authorisation;

  • Security means a mortgage, charge, pledge, lien or other security interest securing any obligation of any person or any other agreement or arrangement having a similar effect.

  • Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.

  • Firearm accessory means a device specifically designed or adapted to enable an individual to wear, carry, store, or mount a firearm on the individual or on a conveyance and an item used in conjunction with or mounted on a firearm that is not essential to the basic function of the firearm. The term includes a detachable firearm magazine.

  • Security Documentation means the Security Documentation applicable to the specific Services purchased by Client, as updated from time to time, or as otherwise made reasonably available by IRONSCALES.

  • The HIPAA Security Rule means the Security Standards for the Protection of 23 electronic PHI at 45 CFR Part 160, Part 162, and Part 164, Subparts A and C.

  • Access Application means an application for Access Rights as described in section 3.7;

  • Accessory use means a use which is incidental and subordinate to the principal use of the parcel of land on which it is located.

  • Bid Security (BS) means Earnest Money Deposit / monetary or financial guarantee to be furnished by a bidder along with its tender.

  • Cyber security means the condition in which road vehicles and their functions are protected from cyber threats to electrical or electronic components.

  • Russian Security means a Security issued by a Russian issuer.

  • Access Agreement means an agreement between an Access Holder and ARTC for Access Rights;

  • Conditional Access means control mechanisms, data structures and commands that scramble and encrypt signals in order to provide selective access and denial of specific channels, data, information or services to paying Subscribers.

  • Quasi-Security means an arrangement or transaction described in paragraph (b) below.

  • Local Access and Transport Area or "LATA” has the meaning given to the term in the Act.