Vehicle Security Sample Clauses

Vehicle Security. The Supplier will be responsible and provide assurances to the Client for security of all vehicles used for the delivery of this contract. This will include, identification of driver responsibilities and processes in place to ensure adherence to security policies, a process of reporting failures to comply with the driver responsibilities and a disciplinary process that will deal adequately with any breaches to the driver security responsibilities. The Client would consider the following as breaches in vehicle security:  Leaving the vehicle open in full view the Client’s general staff and/or of members of the public;  Leaving the vehicle unlocked and unattended;  Not using a hard-sided vehicle for any service delivery unless agreed with the Client in writing; and  Leaving the vehicle in any state that could mean the vehicle could be stolen.
AutoNDA by SimpleDocs
Vehicle Security. Outlined below are the vehicle security procedures that will be followed by Owner Operators and Hourly Drivers:  Vehicles used in the transport of shipments must have secure doors (front, side, rear and roll-up doors);  Vehicles must be locked when shipments are being transported at all times;  Custodial control of the shipments while on route, shall be the responsibility of the Owner Operator or Driver;  Vehicles shall be locked at all times when unattended;  Cargo vans require a pad lock on the back door and the Owner Operator is responsible to ensure this occurs and the lock is used;  Cargo located on loading docks or ramps shall at no time be left unattended. Failing a loss to the Company or its customers, then the Owner Operator or the Hourly Employee will be subject to progressive discipline. A loss is deemed to be freight of any kind or customer property. For Hourly Employees a loss will also include Company vehicles. Any other loss of Company property will be addressed as outlined as per the C.B.A.
Vehicle Security. The Supplier shall be responsible for and provide assurances to the Contracting Authorities in respect of the security of all vehicles used for the delivery of this Framework Agreement. This will include, identification of driver responsibilities and processes in place to ensure adherence to security policies, a process of reporting failures to comply with the driver responsibilities and a disciplinary process that will deal adequately with any breaches to the driver security responsibilities.
Vehicle Security. It is preferable Council vehicles be parked off street overnight, and all tools and materials be stored in the locked area of the vehicle. A statement must be submitted addressing how the vehicle is to be secured to the satisfaction of the Manager Maintenance Services.
Vehicle Security. The Successful Contractor shall have a secure area in which to store County owned vehicles which are on the Contractor’s premises for more than one (1) day. The Successful Contractor shall be responsible for risk of loss or damages to County Owned Vehicles while in the Successful Contractor’s care, until work/repairs are accepted by the County and vehicle is returned to the County. All necessary replacement or repair will be at the Successful Contractor’s expense.
Vehicle Security. If the vehicle is left unattended the steering lock must be securely locked on the steering wheel to ensure the safety and security of the vehicle Vehicle Weight It is the hirer’s responsibility to ensure the gross vehicle weight in no more than 3500KG when fully loaded and must ensure contents are secure at all times. Pets We do allow Dogs/pets dependant on age and breed in certain vehicles so long as they sleep in their own beds and you use your own throws to protect the upholstery. We charge a £100 per week and you must ensure that the Motorhome interior is pristine and shows no sign of a pet having been in it upon its return for the next hirer and also there may be a possibility that future hirers have an allergy to pets.
Vehicle Security. Vehicles must be locked with keys removed and windows rolled up when left unattended. No tools or materials are to be left in an open box or trailer unless they are secured.
AutoNDA by SimpleDocs

Related to Vehicle Security

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Card Security This Card may be used without a personal identification number (PIN) to make purchases. Therefore, if you lose your Card, someone will be able to use it. Protect your Card and PIN at all times.

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

Time is Money Join Law Insider Premium to draft better contracts faster.