CONTROL ACCESS Sample Clauses

CONTROL ACCESS. 3.4.1 Isolate the Work Area to prevent entry by building occupants into Work Area or surrounding controlled areas. Accomplish isolation by the following:
AutoNDA by SimpleDocs
CONTROL ACCESS a. Access to the work area shall be controlled by key cards, key pad access, or other secure means. Only authorized and cleared personnel shall be permitted in the area where County documents are stored, scanned or indexed.
CONTROL ACCESS. Xxxxxx Parking to install the required mechanical equipment that will restrict public access to the area that will be subject to the license agreement. EXHIBIT “A” ALL THAT TRACT OR PARCEL OF LAND lying and being in the City of Atlanta, Land Lot 77 of the 14th District of Xxxxxx County, Georgia, and being more particular described as the parking lot surface area located northwardly from the intersection of Xxxxxxx Way S.E. and Lower Wall Street.
CONTROL ACCESS. Control access of other users to the relevant parts of the Land during Harvest Periods to ensure that the Xxxxxx Xxxxx are not used in an unsafe manner or congested during harvesting.
CONTROL ACCESS. Control access of other users to the relevant parts of the Land during Harvest Periods to ensure that the Forest Roads are not used in an unsafe manner or congested during harvesting.
CONTROL ACCESS. At CSSI we provide access privileges to Client Information (including networks, systems, applications, computers and mobile devices) based on the following principles:  Need to know – users or resources will be granted access to systems that are necessary to fulfill their roles and responsibilities. 1010 DocuSign Envelope ID: DBC345F1-1B5B-46A7-841E-E9E779712B1F Florida Department of Management Services Information Technology Staff Augmentation Services - 3rd Bid RFP No. 15-80101507-SA-D  Least privilege – users or resources will be provided with the minimum privileges necessary to fulfill their roles and responsibilities

Related to CONTROL ACCESS

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

Time is Money Join Law Insider Premium to draft better contracts faster.