Security Infrastructure Sample Clauses

Security Infrastructure. The security infrastructure associated with the AP1000 Plant includes the security system (SES) for the design and hardware inside the Standard Plant and the access portals, equipment and barriers to control access to the Protected Area. The Protected Area access and barriers will be designed and constructed to include: • Barriers to vehicle access including big rocks and pop-up road barrier • Fencing • Gravel base between fencing • Lighting • Communications • Access control system • Intruder detection systems including cameras and infrared sensing systems • Security building at main access portal • Vehicle access portal • Main road security post • Search area equipment • Security power system A detailed description of the Site security infrastructure will be provided in Phase 1.
AutoNDA by SimpleDocs
Security Infrastructure.  Provider shall be in charge of acquisition, installation and operation of security solution as well as equipment so that the Client’s service could be provided in a stable manner. ‚ Provider shall be in charge of security review and abusing response and also respond to the security breaches.
Security Infrastructure. Rhaegal do not store but only processes data on your behalf. We understand the nature of our role as a Data Processor and take appropriate measures to protect any unauthorized use or access. Our Security Infrastructure includes Intrusion detection services, security monitoring, Restricted Physical Access, Restricted Network Access, Encrypted Data Access, Redundant firewalls, Isolated public/private LANs, Isolated NAS and SAN access, and Real-time anti-virus. In addition, only restricted individuals and workstations may update critical elements of the system such as Firewall rules, Settings, recovery procedures, and backup procedures. System monitors and logs all major components including application services, system settings, load balancers, firewalls and LAN traffic. Any security inquiries can be addressed at xxxxxxxx@xxxxxxx.xxx.
Security Infrastructure. The following infrastructure and security is provided at the Company’s data centres in the United Kingdom with 1 and 1
Security Infrastructure. The security infrastructure associated with the AP1000 Plant includes the security system (SES) for the design and hardware inside the Standard Plant and the access portals, equipment and barriers to control access to the Protected Area. The Protected Area access and barriers will be designed and constructed to include: · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] · [**] A detailed description of the Site security infrastructure will be provided in Phase 1.
Security Infrastructure. To ensure that an adequate level of information security is achieved and maintained, a security structure has been developed to support the information systems. The security structure includes senior business managers who are responsible for ensuring that a level of information security is achieved which is commensurate with both the business need to provide the system, and the overall threat to the information systems. Key appointments in the security infrastructure that support the information systems are:
Security Infrastructure. 3.4.3.1 Security applies to all aspects of the BEAP design and operation, from the policies and procedures of the people working with the BEAP, right through to the physical security of the data centre(s) that host the BEAP.
AutoNDA by SimpleDocs
Security Infrastructure. Each facility is protected by a “defense-in-depth” security architecture consisting of firewalls, IDS (Intrusion Detection Systems), anti-virus/anti-malware protection, monitoring capabilities, and DDoS protection monitoring and mitigation.

Related to Security Infrastructure

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Collateral The Collateral for this Note includes the Funding Agreement and the Guarantee specified on the face hereof.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

  • Security Interest and Collateral In order to secure the payment and performance of the Secured Obligations, the Debtor hereby grants to the Secured Party a security interest (herein called the “Security Interest”) in and to the following property (hereinafter collectively referred to as the “Collateral”): SEE EXHIBIT A ATTACHED HERETO AND INCORPORATED HEREIN BY THIS REFERENCE.

  • Financing Services The Manager shall:

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • Collateral and Guaranty Matters The Lenders irrevocably authorize the Administrative Agent, at its option and in its discretion,

  • Security Interest This Agreement creates a valid and continuing security interest (as defined in the UCC) in the Receivables in favor of the Issuer, which security interest is prior to all other Liens, and is enforceable as such against creditors of and purchasers from the Seller.

Time is Money Join Law Insider Premium to draft better contracts faster.