Security and Guest Policies Sample Clauses

Security and Guest Policies. Xxxxxx Lakeside at Reeds Landing provides 24- hour awake reception/security staff. All guests are requested to sign in when arriving and sign out when leaving. The guest sign in / sign out book is located in the Reception area of the facility. Residents are asked to sign out when leaving the facility and to indicate their destination and an estimated time of return. The sign out book is located in the Reception area of the facility. Xxxxxx Lakeside at Reeds Landing accounts for the presence of residents living in assisted living at all three meals and at bedtime. An awake Resident Assistant is stationed on each
AutoNDA by SimpleDocs

Related to Security and Guest Policies

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Guest Policy All guests must abide by the rules and policies outlined in the Residence Handbook and University protocols in place. In shared units, guests (especially overnight guests) must be discussed and approved by all roommates and suitemates in advanced. All guests must be signed into the building, and resident host will be held responsible for their behaviour and actions during their stay. NOISE: Residents are required to adhere to quiet-hours policy within their building. Excessive noise, which disturbs the comfort of other residents, is prohibited. INTERNET SERVICE: InRes Services provides Internet service (wired or wireless) to all undergraduate residence buildings. Students should report maintenance issues or service interruptions directly through their office. STORAGE: The University does not provide storage facilities for student’s personal belongings or furnishings. It is the resident’s responsibility to arrange for one if they require so. ROOM DECORATIONS: Students are not permitted to paint, or make alterations in their room, suite and/or common areas. Room decorations must also comply with the University’s building code and standards. FURNITURE: Students are not permitted to bring large pieces of furniture, including beds/waterbeds, desks and dressers, into residence. Furniture cannot be removed from residence rooms, common areas or buildings. Furniture from other areas of the University cannot be relocated to a student’s room. ANIMALS/PETS: Pets are not permitted in any of the residence buildings. Students with registered service animals should contact Housing & Conference Services to make appropriate arrangements. CLEANLINESS: Students are responsible to maintain a standard of cleanliness that creates a hospitable environment and always adhere to Health and Safety regulations. They are accountable to always keep their room/suite in a clean and orderly condition. Residence rooms/suites are inspected at least once per term. Residents share the responsibility for cleanliness in the common rooms, kitchens, washrooms, and other shared space within the room/suite and building. Failure to comply with cleaning standards may result in sanctions and additional cleaning fees. KITCHENS: Kitchen appliances are not permitted in residence rooms. Students are only allowed to keep a small compact refrigerator in their spaces. Kitchen appliances, provided in suites and common areas, must be used in a safe, responsible manner. SMOKING: York University Residence is a smoke-free environment. Smoking (including e-cigarettes) is strictly prohibited inside or within nine meters of the buildings. This includes balconies, building entrances, windows, and ventilation system air intakes. Policy on cannabis smoking, possession and cultivation are available in the Residence Community Standards.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Use, Security, and Retention Local Agency shall use, hold and maintain State Confidential Information in compliance with any and all applicable laws and regulations in facilities located within the United States, and shall maintain a secure environment that ensures confidentiality of all State Confidential Information wherever located. Local Agency shall provide the State with access, subject to Local Agency’s reasonable security requirements, for purposes of inspecting and monitoring access and use of State Confidential Information and evaluating security control effectiveness. Upon the expiration or termination of this Agreement, Local Agency shall return State Records provided to Local Agency or destroy such State Records and certify to the State that it has done so, as directed by the State. If Local Agency is prevented by law or regulation from returning or destroying State Confidential Information, Local Agency warrants it will guarantee the confidentiality of, and cease to use, such State Confidential Information.

Time is Money Join Law Insider Premium to draft better contracts faster.