Deposits There will be two types of Deposits: Full and Differential. For both types, the universe of Registry objects to be considered for data escrow are those objects necessary in order to offer all of the approved Registry Services.
Financial Institution The Financial Institution will not be liable under this Agreement, except for (i) its own willful misconduct, bad faith or negligence or (ii) breach of its representations and warranties in this Agreement. The Financial Institution will not be liable for special, indirect or consequential losses or damages (including lost profit), even if the Financial Institution has been advised of the likelihood of the loss or damage and regardless of the form of action.
Dealer The seller of automobiles or light trucks that originated one or more of the Receivables and assigned the respective Receivable, directly or indirectly, to Ally Bank under an existing agreement between such seller and Ally Bank. Dealer Agreement: An existing agreement between Ally Bank or one of its Affiliates and a Dealer with respect to a Receivable. Default: Any occurrence that is, or with notice or the lapse of time or both would become, an Event of Default.
Custodian or Foreign Securities System The Custodian may hold foreign securities for all of its customers, including the Portfolios, with any Foreign Sub-Custodian in an account that is identified as belonging to the Custodian for the benefit of its customers, provided however, that (i) the records of the Custodian with respect to foreign securities of the Portfolios which are maintained in such account shall identify those securities as belonging to the Portfolios and (ii), to the extent permitted and customary in the market in which the account is maintained, the Custodian shall require that securities so held by the Foreign Sub-Custodian be held separately from any assets of such Foreign Sub-Custodian or of other customers of such Foreign Sub-Custodian.
Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.