Other Security Measures Sample Clauses

Other Security Measures. Portions of the facilities used by Provider to provide the Services shall be subject to data and records protection and physical security measures set forth on the DATA PRIVACY AND SECURITY PROCEDURES SCHEDULE. Provider will provide the Hardware, Software and other resources required to meet its obligations under this Article 11. If Provider provides the Services from a physical location or device that is shared with a third party or used in part on behalf of a third party, Provider shall develop a process, subject to Company's prior written approval, to restrict access to the Company Information by Provider's employees, subcontractors or agents engaged in business activities on behalf of a third party. Where Provider provides Company, Company Group, or their employees, agents and contractors access to Provider facilities with password or other access restrictions, including restrictions to prevent unauthorized access to portions of Provider facilities containing data of Provider or its other customers, Company agrees to abide by all reasonable data security policies imposed by Provider. [***]* -------- * Confidential information has been omitted
AutoNDA by SimpleDocs
Other Security Measures. System administrator authorization and server authentication will be employed as measures to protect data transfers. For externally facing access, server authentication will be accomplished using digital certificates issued by DigiCert or other reputable certifying authority.
Other Security Measures. The security of your personal and financial information is very important. We maintain physical, electronic and procedural safeguards to protect your personal Account information. Our employees and agents have access to that information only so that they may offer you products or provide services, for example, when responding to your Account questions.
Other Security Measures. As a security measure, Walmart may, but is not required to, impose transaction limits on you or some or all customers relating to the value of any transaction or disbursement, the cumulative value of all transactions or disbursements during a period of time, or the number of transactions per day or other period of time.
Other Security Measures. (1) The encryption of data in transit is provided through HTTPS based access. All documents and data at rest in the Hosted Service are encrypted.
Other Security Measures. Provider and Company will comply with all relevant and applicable Company and Provider security policies, standards, requirements and specifications regarding the Facilities set forth in the Services and Support Responsibilities Schedule. Provider will provide the hardware and software set forth in the applicable Schedules to implement the security measures agreed upon by the Parties and specified in the Schedules. If Provider provides the Services from a physical location that is shared with a third party, Provider shall develop a process, subject to Company’s reasonable approval, to restrict access to the Company’s Confidential Information by Provider’s employees, subcontractors or agents engaged in business activities relating to a competitor of Company.
Other Security Measures. LIMITATIONS ON WIRE TRANSFERS You authorize the following checked limitations and criteria to be applicable to each transaction covered by this Agreement. The credit union will use the limitations checked below to process wire transfer requests.
AutoNDA by SimpleDocs
Other Security Measures. 3. What procedural security measures has the vendor taken to protect its network? a. Timely removal of terminated employees, b. Security awareness training – focus on phishing emails (required by PSC), c. Security policies & procedures (e.g. computer use policy, incident response plan, disaster recovery plan, security policy, risk management policy, etc.),
Other Security Measures. 3. What procedural security measures has the vendor taken to protect its network?

Related to Other Security Measures

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Relation to Other Security Documents The provisions of this Agreement shall be read and construed with the other Loan Documents referred to below in the manner so indicated.

  • No Other Security Interests 20. For each of the Receivables, reviewed the Data Tape to determine that each Receivable is only in one pool of receivables, determined that the executed transaction documents contained a Security Interest opinion of outside counsel in connection with the transaction, and determined that a recent annual UCC opinion was issued. Pooling Agreement Appendix B (7) – One Original Contract

  • Agreement to Deliver Security Documents The Borrower shall promptly deliver, and to cause each of the Guarantors to deliver, to further secure the Obligations, deeds of trust, mortgages, chattel mortgages, security agreements, financing statements and other Security Documents in form and substance satisfactory to the Administrative Agent for the purpose of granting, confirming, and perfecting first and prior liens or security interests in (i) prior to the occurrence of a Default (A) at least eighty percent (80%) of the present value of the Borrower's and the Guarantors' Oil and Gas Properties constituting proved reserves to which value is given in the determination of the then current Borrowing Base, (B) after the occurrence of a Default, at least ninety-five percent (95%) of the present value of the Borrower's and the Guarantors' Oil and Gas Properties, (ii) all of the equity interests of the Borrower or any Guarantor in any other Guarantor now owned or hereafter acquired by the Borrower or any Guarantor, and (iii) all property of the Borrower or any Guarantor of the type described in the Security Agreement attached hereto as Exhibit I. The Borrower also agrees to deliver, or to cause to be delivered, to the extent not already delivered, whenever requested by the Administrative Agent in its sole and absolute discretion (a) favorable title information (including, if reasonably requested by the Administrative Agent, title opinions) acceptable to the Administrative Agent with respect to the Borrower's or any Guarantor's Oil and Gas Properties constituting at least eighty percent (80%) of the present value, determined by the Lenders in their sole and absolute discretion and in accordance with their normal practices and standards for oil and gas loans as it exists at the particular time, of the Borrower's and the Guarantors' properties and demonstrating that the Borrower or a Guarantor, as applicable, have good and defensible title to such properties and interests, free and clear of all Liens (other than those permitted by Section 7.1) and covering such other matters as the Administrative Agent may reasonably request and (b) favorable opinions of counsel satisfactory to the Administrative Agent in its sole discretion opining that the forms of Mortgage are sufficient to create valid first deed of trust or mortgage liens in such properties and interests and first priority assignments of and security interests in the Hydrocarbons attributable to such properties and interests and proceeds thereof. In addition and not by way of limitation of the foregoing, in the case of the Borrower or any Guarantor granting a Lien in favor of the Administrative Agent upon any assets having a present value in excess of $1,000,000 located in a new jurisdiction, the Borrower or Guarantor will at its own expense, obtain and furnish to the Administrative Agent all such opinions of legal counsel as the Administrative Agent may reasonably request in connection with any such security or instrument.

  • Other Securities The Trustees may, subject to the Fundamental Policies and the requirements of the 1940 Act, authorize and issue such other securities of the Trust as they determine to be necessary, desirable or appropriate, having such terms, rights, preferences, privileges, limitations and restrictions as the Trustees see fit, including preferred interests, debt securities or other senior securities. To the extent that the Trustees authorize and issue preferred shares of any class or series, they are hereby authorized and empowered to amend or supplement this Declaration as they deem necessary or appropriate, including to comply with the requirements of the 1940 Act or requirements imposed by the rating agencies or other Persons, all without the approval of Shareholders. Any such supplement or amendment shall be filed as is necessary. The Trustees are also authorized to take such actions and retain such persons as they see fit to offer and sell such securities.

  • Method of Realizing Upon the Pledged Property: Other Remedies Upon the occurrence of an Event of Default, in addition to any rights and remedies available at law or in equity, the following provisions shall govern the Secured Party’s right to realize upon the Pledged Property:

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Time is Money Join Law Insider Premium to draft better contracts faster.