Personnel Access Sample Clauses

Personnel Access. The Service Recipient shall limit access to the Systems to those personnel who are specifically authorized to have such access, and to prevent unauthorized access, use, destruction, alteration or loss of information contained therein. The Service Recipient shall notify its own personnel of the restrictions set forth in this Section 5.3.2 and of the Security Regulations.
AutoNDA by SimpleDocs
Personnel Access. The Contactor will require all employees who will have access to Metro data, the architecture that supports Metro data, or any physical or logical devices/code to pass an appropriate background investigation.
Personnel Access. Spinco shall use commercially reasonable efforts to limit access to the Systems to those personnel who are specifically authorized to have such access, and to prevent unauthorized access, use, destruction, alteration or loss of information contained therein. Spinco shall notify its own personnel of the restrictions set forth in this Section 4.4 and of the Security Regulations.
Personnel Access. The Xxx.xxx hosted facility utilizes state-of-the-art biometric security to enforce physical access limitations to the Xxx.xxx environment. Access to this hosted facility is restricted to authorized operations personnel. Access to the Xxx.xxx cage within the hosted facility is also restricted to authorized operations personnel.
Personnel Access. 1. Access to the work site, which is within a correctional facility, will be monitored and controlled by the Department of Corrections in order to prevent importation of contraband and escape of inmates. At no time will contractor staff enter areas of the facility that are off-limits to them, nor drive vehicles along the perimeter fence or other unauthorized areas unless directed to do so by security staff.
Personnel Access. Contractor and all associated sub-contractors employees shall provide all information required for background checks to meet installation accessrequirements. Contractor workforce must comply with all personal identity verification requirements (FAR clause 52.204-9, Personal Identity Verification of Contractor Personnel). In addition to the changes otherwise authorized by the changes clause of this contract, should the Force Protection Condition (FPCON) at any individual facility orinstallation change, the Government will require changes in contractor security mattersor processes.
Personnel Access the most senior employees of FCF and such other personnel and advisers as may be reasonably nominated by Teal and approved by FCF; and
AutoNDA by SimpleDocs
Personnel Access. This paragraph will describe the badging plan to allow unescorted and escorted access to the Security Identification Display Area (SIDA) / Non-SIDA area for personnel T-26508/ 1005403_2 EXHIBITH -4 involved in this project. Airport Master Plan Team will advise contractors as to the type of badging that will be required for the project (SIDA or Non-SIDA.) The following statements can be used as they apply: The Gate(s) and/or Door(s) to be used for personnel access are: Only SIDA/Non-SIDA badged personnel will be allowed unescorted access to the SIDA/Non-SIDA areas. Escorted personnel within the SIDA will wear an “Escort Required” badge and be within sight and sound of the SIDA badged individual providing escort. Escorted personnel outside the SIDA will be within sight and sound of a badged individual. All superintendents, foremen, gate guards, and escorts will be SIDA/Non-SIDA badged. Workers who do not have their SIDA/Non-SIDA badge in their possession will be considered unbadged and must be escorted. There will be no unbadged or unescorted personnel on the SIDA/Non-SIDA areas. NOTE: There will be authorized representative(s) for (company name) who will be responsible for ensuring that all persons requiring unescorted access to the SIDA/AOA are properly badged. At the contractor’s expense, all persons requiring unescorted access to the SIDA area will be fingerprinted by the Airport in accordance with 49 CFR Part 1542.209 to determine badge applicant eligibility. Furthermore, (company name) understands that they will accept responsibility for control and accountability of all SJC SIDA / Non-SIDA badges issued to their employees, as well as those issued to the employees of their subcontractors. If a company employee or employee of a subcontractor is terminated, an authorized representative will confiscate his/her badge and notify the Airport ID Badging Office immediately by calling (000) 000-0000. The confiscated badge must be returned to the Airport Badging Office immediately.
Personnel Access 

Related to Personnel Access

  • Access to Personnel and Records Each Party shall authorize its respective auditors to make reasonably available to each other Party’s auditors (each such other Party’s auditors, collectively, the “Other Parties’ Auditors”) both the personnel who performed or are performing the annual audits of such audited Party (each such Party with respect to its own audit, the “Audited Party”) and work papers related to the annual audits of such Audited Party, in all cases within a reasonable time prior to such Audited Party’s auditors’ opinion date, so that the Other Parties’ Auditors are able to perform the procedures they reasonably consider necessary to take responsibility for the work of the Audited Party’s auditors as it relates to their auditors’ report on such other Party’s financial statements, all within sufficient time to enable such other Party to meet its timetable for the printing, filing and public dissemination of its annual financial statements. Each Party shall make reasonably available to the Other Parties’ Auditors and management its personnel and Records in a reasonable time prior to the Other Parties’ Auditors’ opinion date and other Parties’ management’s assessment date so that the Other Parties’ Auditors and other Parties’ management are able to perform the procedures they reasonably consider necessary to conduct the Internal Control Audit and Management Assessments.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Personnel Policies The School shall adopt, update, and adhere to personnel policies. These policies must be made readily accessible from the School’s website or school office, as described in Section 11.4.1. If the policy is not available from the School’s website, the School shall submit the current policy to the Commission.

  • Personnel Provide, without remuneration from or other cost to the Trust, the services of individuals competent to perform the administrative functions which are not performed by employees or other agents engaged by the Trust or by the Adviser acting in some other capacity pursuant to a separate agreement or arrangement with the Trust.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Review Systems; Personnel It will maintain business process management and/or other systems necessary to ensure that it can perform each Test and, on execution of this Agreement, will load each Test into these systems. The Asset Representations Reviewer will ensure that these systems allow for each Review Receivable and the related Review Materials to be individually tracked and stored as contemplated by this Agreement. The Asset Representations Reviewer will maintain adequate staff that is properly trained to conduct Reviews as required by this Agreement.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Full Access The Seller will permit representatives of the Buyer to have full access at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Seller to the Property and to obtain copies of all books, records, contracts, and documents of or pertaining to the Property.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.