Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.
Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.
Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.
Security Interest in Financed Vehicles Immediately prior to the transfer of the Receivables by the Depositor to the Trust, each Receivable was secured by a valid, binding and enforceable first priority perfected security interest in favor of the Seller in the related Financed Vehicle, or all necessary and appropriate actions shall have been commenced that would result in the valid perfection of a first priority security interest in favor of the Seller in the Financed Vehicle, which security interest has been validly assigned by the Seller to the Depositor pursuant to the Receivables Purchase Agreement and by the Depositor to the Trust hereunder.
Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.
Security Interest in Financed Vehicle Immediately prior to the sale, transfer and assignment thereof pursuant hereto and the First Step Receivables Assignment, each Receivable was secured by a validly perfected first priority security interest in the Financed Vehicle in favor of the Seller as secured party or all necessary and appropriate action had been commenced that would result in the valid perfection of a first priority security interest in the Financed Vehicle in favor of the Seller as secured party.
SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.
Security confirmation On the Effective Date, each Obligor confirms that:
Negotiable Collateral In the event that any Collateral, including proceeds, is evidenced by or consists of Negotiable Collateral, and if and to the extent that perfection or priority of Agent's security interest is dependent on or enhanced by possession, the applicable Borrower, immediately upon the request of Agent, shall endorse and deliver physical possession of such Negotiable Collateral to Agent.