Access to Security Identification Display Areas and Identification Media Sample Clauses

Access to Security Identification Display Areas and Identification Media. Concessionaire shall be responsible for requesting the Aviation Department to issue Airport Issued Identification Media to all employees who are authorized access to Security Identification Display Areas ("SIDA") on the Airport, as designated in the Airport Security Program. In addition, Concessionaire shall be responsible for the immediate reporting of all lost or stolen Airport Issued Identification Media and the immediate return of the media of Concessionaire's personnel transferred from the Airport, or terminated from the employ of Concessionaire, or upon termination of this Agreement. Before an Airport Issued Identification Media is issued to an employee, Concessionaire shall comply with the requirements of applicable Federal regulations with regard to fingerprinting for criminal history record checks and security threat assessments, and shall require that each employee complete security training programs conducted by the Aviation Department. Concessionaire shall pay or cause to be paid to the Aviation Department such charges as may be established from time to time for lost or stolen Airport Issued Identification Media and those not returned to the Aviation Department in accordance with these provisions. The Aviation Department shall have the right to require Concessionaire to conduct background investigations and to furnish certain data on such employees before the issuance of Airport Issued Identification Media, which data may include the fingerprinting of employee applicants for such media.
AutoNDA by SimpleDocs
Access to Security Identification Display Areas and Identification Media. The consultant/contractor shall be responsible for requesting the Aviation Department to issue Airport Issued Identification Media to all employees who are authorized access to Security Identification Display Areas ("SIDA") on the Airport, as designated in the Airport Security Program. In addition, consultant/contractor shall be responsible for the immediate reporting of all lost or stolen Airport Issued Identification Media and the immediate return of the media of consultant/contractor's personnel transferred from the Airport, or terminated from the employ of the consultant/contractor, or upon termination of this Agreement. Before an Airport Issued Identification Media is issued to an employee, consultant/contractor shall comply with the requirements of applicable Federal regulations with regard to fingerprinting for criminal history record checks and security threat assessments, and shall require that each employee complete security training programs conducted by the Aviation Department. The consultant/contractor shall pay or cause to be paid to the Aviation Department such charges as may be established from time to time for lost or stolen Airport Issued Identification Media and those not returned to the Aviation Department in accordance with these provisions. The Aviation Department shall have the right to require the consultant/contractor to conduct background investigations and to furnish certain data on such employees before the issuance of Airport Issued Identification Media, which data may include the fingerprinting of employee applicants for such media.
Access to Security Identification Display Areas and Identification Media. Provider shall be responsible for requesting the Aviation Department to issue Airport Issued Identification Media to all Provider's and its subcontractors employees who are authorized access to Security Identification Display Areas ("SIDA") on the Airport, as designated in the Airport Security Program. In addition, Provider shall be responsible for the immediate reporting of all lost or stolen Airport Issued Identification Media and the immediate return of the media of Provider's and its subcontractor's personnel transferred from the Airport, or terminated from the employ of Provider or any if its subcontractors, or upon termination of this Agreement. Before an Airport Issued Identification Media is issued to an employee of Provider or any of its subcontractors, Provider shall comply with the requirements of applicable federal regulations with regard to fingerprinting for criminal history record checks and security threat assessments, and shall require that each employee complete security training programs conducted by the Aviation Department. Provider shall pay or cause to be paid to the Aviation Department such charges as may be established from time to time for lost or stolen Airport Issued Identification Media and those not returned to the Aviation Department in accordance with these provisions. The Aviation Department shall have the right to require Provider to conduct background investigations and to furnish certain data on such employees before the issuance of Airport Issued Identification Media, which data may include the fingerprinting of employee applicants for such media.

Related to Access to Security Identification Display Areas and Identification Media

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Product Identification Before removal from Sale Area, unless Contracting Officer determines that circumstances warrant a written waiver or adjustment, Purchaser shall:

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Contractor’s Staff Identification Contractor shall provide, at Contractor’s expense, all staff providing services under this Contract with a photo identification badge.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

Time is Money Join Law Insider Premium to draft better contracts faster.