Enforcing Security Sample Clauses

Enforcing Security. 8.1 When we can enforce the security. We can enforce the security after any of the events listed below has occurred. We can do so even if the cause of the event is outside anyone’s control. We can do so without presentment, protest, demand or notice, all of which you waive. If you are more than one person, an event for each person is an event of default for both or all of you. The events are:
AutoNDA by SimpleDocs
Enforcing Security. Actual or attempted unauthorized use of the Site or the Services may result in criminal or civil prosecution. For User’s protection, Kevala reserves the right to view, monitor, and record activity related to the Site or Services without notice or further permission from User, to the fullest extent permitted by applicable law. Any information obtained by monitoring, reviewing, or recording is subject to review by law enforcement organizations in connection with the investigation or prosecution of possible criminal activity related to the Site or Services. Kevala will also comply with all court orders involving requests for such information, and User hereby authorizes Kevala to do so.
Enforcing Security. Actual or attempted unauthorized use of any of the Digital Media, the Services and/or the PRE Materials may result in criminal and/or civil prosecution. For your protection, PRE reserves the right to view, monitor, and record activity within the Digital Media without notice or further permission from you, to the fullest extent permitted by applicable law. Any information obtained by monitoring, reviewing, or recording is subject to review by law enforcement organizations in connection with the investigation or prosecution of possible criminal activity within any of the Digital Media. PRE will also comply with all court orders involving requests for information.
Enforcing Security. Actual or attempted unauthorized use of any of the Site may result in criminal and/or civil prosecution. For your protection, Moody’s reserves the right to view, monitor, and record activity on the Site without notice or further permission from you, to the fullest extent permitted by applicable law. Any information obtained by monitoring, reviewing, or recording is subject to review by law enforcement organizations in connection with the investigation or prosecution of possible criminal activity on any of the Site. Moody’s will also comply with all court orders involving requests for such information.
Enforcing Security. Actual or attempted unauthorized use of the Licensed Application may result in criminal and/or civil prosecution. For Your protection, the Application Provider reserves the right to view, monitor, and record activity of the Licensed Application without notice or further permission from You, to the fullest extent permitted by applicable law. Any information obtained by monitoring, reviewing, or recording is subject to review by law enforcement organizations in connection with the investigation or prosecution of possible criminal activity on any of the Site. You are responsible for immediately notifying the Application Provider of any unauthorized use the Licensed Application, or breach of Your User Content.
Enforcing Security. 16.1. Actual or attempted unauthorized use of any of the Site and/or Services may result in the institution by Us of criminal and/or civil prosecution. For Your protection, We reserve the right to view, monitor, and record activity on the Site and/or Services without notice or further permission from You, to the fullest extent permitted by the Applicable Law, and only in accordance with this Agreement. This right extends to Our review of tracking activity and details pertaining to claimed violations by You. Any information obtained by monitoring, reviewing, or recording is subject to review by law enforcement organizations in connection with the investigation or prosecution of possible criminal activity on any of the Site and/or Services.

Related to Enforcing Security

  • Continuing Security This Security is a continuing security and will extend to the ultimate balance of the Secured Liabilities, regardless of any intermediate payment or discharge in whole or in part.

  • Building Security Landlord may restrict access to and from the Premises and the Building outside of the ordinary business hours of the Building. Landlord may require identification of persons entering and leaving the Building during this period and, for this purpose, may issue Building passes to tenants of the Building.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • REVERSE ENGINEERING & SECURITY You agree not to undertake any of the following actions:

Time is Money Join Law Insider Premium to draft better contracts faster.