Site Controls Sample Clauses

Site Controls. On-site Data Center Security Operation. Google’s data centers maintain an on-site security operation responsible for all physical data center security functions 24 hours a day, 7 days a week. The on-site security operation personnel monitor closed circuit TV (CCTV) cameras and all alarm systems. On-site security operation personnel perform internal and external patrols of the data center regularly. Data Center Access Procedures. Google maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors are allowed entry to the data centers. Only authorized employees and contractors are permitted to request electronic card key access to these facilities. Data center electronic card key access requests must be made through e-mail, and require the approval of the requestor’s manager and the data center director. All other entrants requiring temporary data center access must: (i) obtain approval in advance from the data center managers for the specific data center and internal areas they wish to visit; (ii) sign in at on-site security operations; and (iii) reference an approved data center access record identifying the individual as approved. On-site Data Center Security Devices. Google’s data centers employ an electronic card key and biometric access control system that is linked to a system alarm. The access control system monitors and records each individual’s electronic card key and when they access perimeter doors, shipping and receiving, and other critical areas. Unauthorized activity and failed access attempts are logged by the access control system and investigated, as appropriate. Authorized access throughout the business operations and data centers is restricted based on zones and the individual’s job responsibilities. The fire doors at the data centers are alarmed. CCTV cameras are in operation both inside and outside the data centers. The positioning of the cameras has been designed to cover strategic areas including, among others, the perimeter, doors to the data center building, and shipping/receiving. On-site security operations personnel manage the CCTV monitoring, recording and control equipment. Secu...
AutoNDA by SimpleDocs
Site Controls i. On-site Data Center Security Operation. Each Google data center maintains an on-site security operation responsible for all physical data center security functions 24 hours a day, 7 days a week. The on-site security operation personnel monitor Closed Circuit TV (CCTV) cameras and all alarm systems. On-site Security operation personnel perform internal and external patrols of the data center regularly.
Site Controls. On-site Data Centre Security Operation. IT Farm’s Subprocessor data centres maintain an on-site security operation responsible for all physical data centre security functions 24 hours a day, 7 days a week.
Site Controls. On-site Data Center Security Operation. Google’s data centers maintain an on-site security operation responsible for all physical data center security functions 24 hours a day, 7 days a week. The on-site security operation personnel monitor closed circuit TV (CCTV) cameras and all alarm systems. On-site security operation personnel perform internal and external patrols of the data center regularly. Data Center Access Procedures. Google maintains formal access procedures for allowing physical access to the data centers. The data centers are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the data center are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors are allowed entry to the data centers. Only authorized employees and contractors are permitted to request electronic card key access to these facilities. Data center electronic card key access requests must be made through e-mail, and require the approval of the xxxxxxxxx’s manager and the data center director. All other entrants requiring temporary data center access must: (i) obtain approval in advance from the data center managers for the specific data center and internal areas they wish to visit;
Site Controls. During the excavation work, field personnel will control access to the Site at the gate along the northern boundary and post signs regarding entry restrictions. The gate will be locked during non-working hours and access will be controlled by Xxxxxxx representatives during the excavation activities. Excavation equipment will remain within the fenced Site boundary throughout the implementation of this Voluntary Cleanup Plan. Before demobilizing the excavator, field personnel will ensure the tracks, buck- et, and/or tires are clean and any potentially contaminated residues removed and left within the fenced enclosure. The ground surface surrounding the Site entrance will be covered with a layer of gravel (like- ly #57 Stone) to mitigate potential tracking of soil onto the adjacent roadway by incoming and outgoing dump trucks being loaded by the excavator. Additionally, given the slight slope of the Site area, field personnel will line the southern, eastern, and western boundaries with silt fencing or other suitable sediment controls to mitigate or altogether eliminate stormwater runoff from the Site to the surrounding roadways or adjacent properties. As the Site area does not qualify for a National Pollutant Discharge Elimination System (NPDES) Construction Stormwater Permit, these controls will be implemented and maintained without a Permit. However, all controls and monitoring of the runoff controls will function in compliance with NPDES requirements and continue throughout the duration of the project.
Site Controls. On-site Datacenter Security Operation. The datacenters maintain an on-site security operation responsible for all physical datacenter security functions 24 hours a day, 7 days a week. The on-site security operation personnel monitor Closed Circuit TV (CCTV) cameras and all alarm systems. On-site Security operation personnel perform internal and external patrols of the datacenter regularly. Datacenter Access Procedures. The co-location facility maintains formal access procedures for allowing physical access to the datacenters. The datacenters are housed in facilities that require electronic card key access, with alarms that are linked to the on-site security operation. All entrants to the datacenter are required to identify themselves as well as show proof of identity to on-site security operations. Only authorized employees, contractors and visitors are allowed entry to the datacenters. On-site Datacenter Security Devices. The co-location facilities employ an electronic card key and biometric access control system that are linked to a system alarm. The access control system monitors and records each individual’s electronic card key and when they access perimeter doors, shipping and receiving, and other critical areas. Unauthorized activity and failed access attempts are logged by the access control system and investigated, as appropriate. The fire doors at the datacenters are alarmed. CCTV cameras are in operation both inside and outside the datacenters. The positioning of the cameras has been designed to cover strategic areas including, among others, the perimeter, doors to the datacenter building, and shipping/receiving. On-site security operations personnel manage the CCTV monitoring, recording and control equipment.
Site Controls. The Redeveloper and subcontractors shall comply with the following:
AutoNDA by SimpleDocs
Site Controls. ‌ Provider understands, acknowledges and agrees that the Site for a given System may be subject to a Site Management Plan, an activity and use limitation, engineering or institutional controls, or other agreement, document or order that may restrict or regulate activities that may be performed on the Site (collectively, “Site Controls”), which, in each instance, shall be disclosed to Provider prior to the execution of this Agreement and which are attached hereto as Schedule 9. Customer stipulates and agrees to an increase in the kWh Rate for such System to the extent any Site Controls implemented after the execution of this Agreement reasonably increase Provider’s cost for providing Solar Services. Notwithstanding anything to the contrary contained herein, Provider’s, its contractors’ and consultants’ activities shall at all times be consistent with the Site Controls applicable to the Site.
Site Controls. On‐site Data Center Security Operation. Elige maintains an on‐site security operation responsible for all physical data center security functions 24 X 7. The on‐site security operation personnel monitor CCTV cameras and all alarm systems. Data Center Access Procedures. Elige maintains formal access procedures for allowing physical access to the data centers. All entrants to the data center are required to identify themselves as well as show proof of identity to on‐site security. All other entrants requiring temporary data center access must: (i) obtain approval in advance for the specific data center; (ii) sign in at on‐site security operations; and (iii) must be accompanied by Elige authorized employees at all times. On‐site Data Center Security Devices. Elige’s data centers employ an electronic card key and biometric access control system that is linked to a system alarm. The access control system monitors and records each individual’s electronic card key when they access perimeter doors, shipping and receiving, and other critical areas. Unauthorized activity and failed access attempts are logged by the access control system and investigated, as appropriate.
Site Controls. Contractor shall be responsible for opening and closing the site in accordance with Section P of this Agreement. Contractor shall keep gates locked during the times when the transfer station is not open. Contractor shall supply both the Director of Public Works and the Local Enforcement Agency (LEA) with a gate key to allow access on days when the transfer station is not open to the public. Contractor need not supply County with a key to the administration room except at the expiration or termination of the contract.
Time is Money Join Law Insider Premium to draft better contracts faster.