Security Specifications definition
Examples of Security Specifications in a sentence
Lessor is hereby notified that Government tenant occupants are not authorized to negotiate, modify, or contract with the Lessor on any matters related to this Lease or its terms and conditions, Construction and Security Specifications, or to obligate the Government for expenditure of funds.
The Government shall accept the Space only if the construction of the Building shell and the build-out of the Space conforming to this Lease and the Construction and Security Specifications attached to this Lease as Exhibt E, are substantially complete and a Certificate of Occupancy (C of O) has been issued as set forth below.
It is agreed that the Lessor shall complete alterations in accordance with Exhibit “A”, Floor Plan, and Exhibit “E”, Construction and Security Specifications, attached hereto and made a part hereof.
For all Seller employees performing under a Prototype Project Agreement subject to DoD Contract Security Specifications (DD 254), as required by the Government.
The technical solutions set out in the Technical and Security Specifications are hereby approved for such purposes.
The digital rights management solutions outlined in the Technical and Security Specifications are hereby deemed approved by Label.
For the sake of clarity, the Parties acknowledge that no rights are granted to Company pursuant to the forgoing sentence to make Authorized Materials available in a **** that is **** (including Subscribers) of the Services as permitted under this Agreement pursuant to the foregoing provisions of this definition and the Technical and Security Specifications.
Landlord shall provide security monitoring for the Building twenty-four (24) hours per day, 365 days per year pursuant to and in accordance with the Security Specifications (as hereinafter defined).
During the Term of this Lease, Landlord shall, at its sole cost and expense, cause the Security Specifications to be in place and enforced.
With respect to third-party certifications and audits obtained by Processor as set forth hereinabove and in the Security Specifications, upon Controller’s written request, at reasonable intervals, Processor shall provide a copy of Processor’s then most recent third-party audit or certification, as applicable, or any summaries thereof, that Processor generally makes available to its clients at the time of such request.