Baseline Physical Access Controls Sample Clauses

Baseline Physical Access Controls. All buildings must employ the following measures to safeguard the information resources they contain: * * * * * * * * *
AutoNDA by SimpleDocs
Baseline Physical Access Controls. All buildings must employ the following measures to safeguard the information resources they contain: • A security guard force to protect against unauthorized access to the building. Guards must be on duty during all hours of expected building operation and conduct internal inspections of the building to ensure appropriate security. • External monitoring of conditions around the building must be conducted. This can be accomplished by external security guard patrols, outside camera monitoring or a combination of both methods where appropriate. Outside lighting must effectively be deployed to support building monitoring. • Off-hour (other than normal business hours) access to building entrances must be achieved by the use of a Card or Token Access system. • A Visitor Access procedure must be followed which requires the following for non-employees to gain entrance to the building: • Sign-in with the security guard in a Visitors Log that is retained and reviewed. • Wearing of a visitor badge to inform personnel that a non-employee is in the area. Visitors must produce picture identification to obtain the badge from the security guard. • Escort of the visitor by American Express personnel while the visitor is in the building. • Property passes must be issued by the property owners and verified by the security guard to effect removal of American Express property from the building. • A sensitive trash program must be in place for each location.

Related to Baseline Physical Access Controls

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Maintaining Records; Access to Properties and Inspections; Maintenance of Ratings (a) Keep proper books of record and account in which full, true and correct entries in conformity with GAAP and all requirements of law are made of all dealings and transactions in relation to its business and activities. Each Loan Party will, and will cause each of its subsidiaries to, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of such Person at reasonable times and as often as reasonably requested and to make extracts from and copies of such financial records, and permit any representatives designated by the Administrative Agent or any Lender to discuss the affairs, finances and condition of such Person with the officers thereof and independent accountants therefor.

  • Periodic Review of Costs of Environmental Compliance In the ordinary course of its business, the Company conducts a periodic review of the effect of Environmental Laws on the business, operations and properties of the Company and its subsidiaries, in the course of which it identifies and evaluates associated costs and liabilities (including, without limitation, any capital or operating expenditures required for clean-up, closure of properties or compliance with Environmental Laws or any permit, license or approval, any related constraints on operating activities and any potential liabilities to third parties). On the basis of such review and the amount of its established reserves, the Company has reasonably concluded that such associated costs and liabilities would not, individually or in the aggregate, result in a Material Adverse Change.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Global Safety Database Licensee shall establish, hold and maintain (at Licensee’s sole cost and expense) the global safety database for Licensed Products.

  • Monitoring System In each case in which the Custodian has exercised delegated authority to place Assets with a Foreign Custodian, the Custodian shall establish a system, to re-assess or re-evaluate selected Foreign Custodians, at least annually in accordance with Rule 17f-5(c)(3).

  • Service Level In the event that League InfoSight discovers or is notified by you of the existence of Non-Scheduled Downtime, we will use commercially reasonable efforts to determine the source of the problem and attempt to resolve it as quickly as possible.

Time is Money Join Law Insider Premium to draft better contracts faster.