SECURITY GATES Sample Clauses

SECURITY GATES. Where a car park is accessed by a security gate, that gate must be located at least 6 metres within the site from the street front property boundary.
AutoNDA by SimpleDocs
SECURITY GATES. Steel security gates: 2 Size 925mm x 1800mm high, as per door schedule. (G12) No 16 Carried Forward to Summary of Section No. 3 R Section No. 3 ALTERATIONS - 4 NO X 4 CLASSROOM Bill No. 9 Metalwork Zethu Consulting Services Amount
SECURITY GATES. On remote jobsites on out-of-town work when an Employee is required to report to any security guarded gate, he shall be paid mileage, in addition to subsistence, unless he lives within ten (10) miles from the jobsite, or unless the Employer furnishes transportation, and the Employee shall report to the security guarded gate at the established starting time and leave the gate at the established quitting time. ADDENDUM NO. 19
SECURITY GATES. The Developer may establish one or more residential communities within the Project as a limited access community, with ingress/egress controlled by manned or unmanned security checkpoints. Responsibility for operation and maintenance of such security checkpoints may be transferred by the Developer to a Property Owner’s Association. While roads behind security gates will remain private, Developer acknowledges jurisdiction of the sheriff, the local fire department, and the need by the public utilities that serve the property and shall not interfere or in any way hinder either public utility activities on the Real Property regardless of whether such may a restricted community.
SECURITY GATES. Security gates are intended to be in the closed and locked position at all times- they will not have the ability to be propped open for any purpose. If you invite guests to meet you, you must arrange a time to meet them at the security gate, as they are not allowed entrance through the gate without your presence. While at The Quick Launch Clubhouse, the Clubhouse manager, staff, and security have the authority to request an identification form and to refuse service to anyone who disregards the Clubhouse rules.
SECURITY GATES i. Standard security gates fitted to front door. FINISHES
SECURITY GATES. Visitors must pass through the library security gates when entering/leaving the library. All backpacks , book bags, purses, etc., are subject to inspection if the security alarm goes off. Selling: Selling any items, unless it is part of an approved library program, panhandling or soliciting money from patrons of the library or library staff. Sexual Misconduct: Patrons are prohibited from engaging in sexual misconduct or harassment, indecent exposure, explicit public displays of affection, viewing or printing illegal materials such as child pornography and other similar actions. Sleeping: Sleeping or laying down in the library. Smoking: Smoking of any type or using /displaying tobacco products, marijuana, vapor/vape pens or e- cigarette products in the library or on library property within 20 feet of an entrance is not allowed.
AutoNDA by SimpleDocs
SECURITY GATES. 1. Thirty-six (36) lineal feet of security gates will be provided at the entry and exit at the servery area.
SECURITY GATES. The following in twenty four framed and welded mild steel security gates and fixing in position complete 89 Double gate in two equal leaves, each leaf formed of 50 x 25 x 1.6mm rectangular hollow section framing all round mitred and welded at angles with two 25 x 25 x 1.6mm mild steel square section 10mm diameter horizontal intermediate rails with ends welded to framing and with eight 19mm diameter rod vertical bars framed through intermediate rails with ends welded to framing, including 6 No x 100mm long butterfly hinges per gate - 3 No per leaf, four lever lockset and handles complete; size 2000 x 2185mm high overall No 2.00

Related to SECURITY GATES

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

Time is Money Join Law Insider Premium to draft better contracts faster.