Physical Security Measures Clause Examples

The Physical Security Measures clause outlines the requirements and standards for protecting physical premises, assets, and sensitive information from unauthorized access or harm. It typically mandates the use of security controls such as locked doors, surveillance cameras, access badges, and visitor logs to safeguard facilities and equipment. By establishing clear expectations for physical protection, this clause helps prevent theft, vandalism, and data breaches, thereby reducing risk and ensuring the safety of both property and personnel.
POPULAR SAMPLE Copied 1 times
Physical Security Measures. Describe security barriers and access controls (e.g., locking of doors, desks and filing cabinets)
Physical Security Measures. Each Party agrees that each will cause the Joint Venture to implement effective physical security measures to secure the Intellectual Property and Confidential Information owned by the Joint Venture or licensed / disclosed to the Joint Venture by AoLunTe or Aura, including, but not limited to, security guards at the entrance to collect items that present security problems (e.g. cameras and flash drives).
Physical Security Measures. (a) Physical Security including Physical Access Control – Maintaining all systems storing or maintaining Community Data in an environment using reasonable physical security measures including those designed to prevent unauthorized access. Service Provider Software shall use reputable, Tier 3 or Tier 4 data center providers.
Physical Security Measures. (a) Data Center Facilities: (i) Physical access restrictions and monitoring that may include a combination of any of the following: multi-zone security, man-traps, appropriate perimeter deterrents (for example, fencing, berms, guarded gates), on-site guards, biometric controls, CCTV, and secure cages; and (ii) fire detection and fire suppression systems both localized and throughout the data center floor.
Physical Security Measures. (a) Physical Security including Physical Access Control – Maintaining all systems storing or maintaining Community Data in an environment using reasonable physical security measures including those designed to prevent unauthorized access. Service Provider Software shall use reputable, Tier 3 or Tier 4 data center providers. (b) Data DeletionCustomer data will be deleted from all systems, including backups, within 180 days from termination of the applicable contract.
Physical Security Measures. 2.1. Supplier has implemented and will maintain and update as appropriate throughout its Processing of Everest Group Personal Data, appropriate physical security measures for any facility used to Process 2.2. Supplier’s servers and office spaces have a physical security program that manages visitors, building entrances, CCTVs (closed circuit televisions), and overall office security. All employees and contractors are required to have approved access cards and visitors are required to be escorted throughout those parts of the premises containing personal data.
Physical Security Measures. 11.2.1 That it has implemented policies and procedures to monitor and limit access to and activities in the room, workstation or facility, including guidelines that specify the proper use of and access to electronic media; 11.2.2 That the design of its office space and work stations, including the physical arrangement of furniture and equipment, shall provide privacy to anyone processing personal data, taking into consideration the environment and accessibility to the public; 11.2.3 That the duties, responsibilities and schedule of individuals involved in the processing of personal data are clearly defined to ensure that only the individuals actually performing official duties shall be in the room or work station, at any given time; 11.2.4 That it has implemented policies and procedures regarding the transfer, removal, disposal, and re-use of electronic media, to ensure appropriate protection of personal data; 11.2.5 That it has implemented policies and procedures that prevent the mechanical destruction of files and equipment. The room and workstation used in the processing of personal data shall, as far as practicable, be secured against natural disasters, power disturbances, external access, and other similar threats.
Physical Security Measures a. If there is a separate physical storage place for storing Personal Data such as computer room or data storage room, the access control procedure should be established and operated. b. Documents containing Personal Data and auxiliary storage media should be kept in a safe place with lock.
Physical Security Measures. 1. Edge USA will take practicable measures to physically secure the U.S.-Philippines Segment, including the DCI and Wet Infrastructure. Edge USA will screen appropriate persons in accordance with Article 4.C, and Edge USA will require that all persons who physically Access the DCI used exclusively for the U.S.-Philippines Segment are escorted at all times by Screened Personnel. 2. Within 60 days of the date of execution of this NSA, Edge USA will submit to the CMAs a policy or policies setting forth its physical security measures. Such policy or policies should describe physical security measures adopted for Edge USA’s separately-owned and operated equipment for the U.S.-Philippines Segment. Within 5 days, Edge USA will propose changes to the policy or policies as necessary to address concerns raised by the CMAs. The CMAs will approve or disapprove the policy or policies within 90 days of receipt, subject to the tolling provisions in Article
Physical Security Measures. (i) Data Centres: Avancie uses its own primary and disaster recovery servers to store client data, including personal information. These servers are installed in secure colocation data centres, which feature security measures including access controls, video surveillance and intrusion detection.