Security Managers Sample Clauses

Security Managers. Tenant designates the following individual(s) as “Tenant’s Security Manager”: Xxxxxxx Xxxxxxxxxxx. The contact information for Tenant’s Security Manager is: Address: 0000 Xxxxx Xxxxx, Xxx Xxxx, xxxxxxxxxx 00000, Phone:(000) 000-0000, Fax:________________, Email: xxxxxxxxxxxx@xxxxxxxxx.xxx. Landlord designates the following individual(s) as “Landlord’s Security Manager”: Xxxxx XxXxxxxx, Director of Security. The contact information for Landlord’s Security Manager is: Address: 0000 Xxxxx Xxxxx, Xxx Xxxx, Xxxxxxxxxx 00000, Phone: (000) 000-0000, Fax: (000) 000-0000, Email: xxxxx.xxxxxxxx@xxxxxx.xxx. Any changes to the identity or contact information above shall be in accordance with the notice provisions in the Lease.
AutoNDA by SimpleDocs

Related to Security Managers

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • City Manager All Contract administration will be effected by the City Manager, and communication pertaining to Contract administration shall be addressed to the City Manager only. No changes, deviations, or waivers shall be effective without a modification of the Contract executed by the City Manager or duly authorized representative authorizing such changes, deviations, or waivers. The City Manager is: Name: Xxxx XxXxxxxxx Title: City Manager Telephone Number: 000-000-0000 E-Mail Address: xxxxxxxxxx@xxxxxxxxxxxxxx.xxx

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Construction Management Services a. A-E may be required to review and recommend approval of submittals, shop drawings, Request for Information (RFI) and/or calculations for temporary structures such as trench shoring, false work and other temporary structural forms.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Other Agents; Arrangers and Managers None of the Lenders or other Persons identified on the facing page or signature pages of this Agreement as a “syndication agent,” “documentation agent,” “co-agent,” “book manager,” “lead manager,” “arranger,” “lead arranger” or “co-arranger” shall have any right, power, obligation, liability, responsibility or duty under this Agreement other than, in the case of such Lenders, those applicable to all Lenders as such. Without limiting the foregoing, none of the Lenders or other Persons so identified shall have or be deemed to have any fiduciary relationship with any Lender. Each Lender acknowledges that it has not relied, and will not rely, on any of the Lenders or other Persons so identified in deciding to enter into this Agreement or in taking or not taking action hereunder.

  • Workload Management 11.1 The parties to this Agreement acknowledge that employees and management have a responsibility to maintain a balanced workload and recognise the adverse affects that excessive workloads may have on employee/s and the quality of resident/client care.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Patch Management All workstations, laptops and other systems that process and/or 22 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 23 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 24 necessary. There must be a documented patch management process which determines installation 25 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 26 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 27 and systems that cannot be patched due to operational reasons must have compensatory controls 28 implemented to minimize risk, where possible.

  • Manager 5.1. Rules relating to the rights, duties and responsibilities of the Managers shall be governed by the Act. Such provisions are hereinafter incorporated into this Agreement by reference. Without limiting the generality of the foregoing, the Manager shall have the powers set forth in Paragraph 5.3 below.

Time is Money Join Law Insider Premium to draft better contracts faster.