Bio-Security Sample Clauses

Bio-Security. Provide details of security measures, in accordance with industry best practice, to be implemented to prevent the spread of invasive species as the works are to be carried out in such a way as to avoid impacting on surrounding habitats. Also provide details of steps to be taken to minimise the movement of vehicles, equipment and personnel in and out of the affected areas, and other site hygiene measures to be employed.
AutoNDA by SimpleDocs
Bio-Security. The Environment Agency operates in a number of sensitive environments that can be irretrievably damaged by the introduction of plants, animal species and diseases not associated with these areas. The Contractor must operate a system that manages the bio security risks associated with the hire of equipment.
Bio-Security. Due to bio-security concerns, no waste or manure obtained from outside the Premises or from non-Xxxxxxx sources shall be processed, stored or used in the System without the prior written consent of Xxxxxxx.

Related to Bio-Security

  • Quebec Security To the extent that any Canadian Credit Party now or in the future is required to grant security pursuant to the laws of the Province of Quebec, each Agent (other than the Collateral Agent) and Lender acting for itself and on behalf of all present and future Affiliates of such Agent or Lender that are or become a Lender Counterparty, hereby irrevocably authorizes and appoints the Collateral Agent to act as the holder of an irrevocable power of attorney (fondé de pouvoir) (within the meaning of Article 2692 of the Civil Code of Quebec) in order to hold any hypothec granted under the laws of the Province of Quebec as security for any debenture, bond or other title of indebtedness that may be issued by any Canadian Credit Party and to exercise such rights and duties as are conferred upon a fondé de pouvoir under the relevant deed of hypothec and applicable laws (with the power to delegate any such rights or duties). Moreover, in respect of any pledge by any such Canadian Credit Party of any such debenture, bond or other title of indebtedness as security in respect of any Obligations, the Collateral Agent shall also be authorized to hold such debenture, bond or other title of indebtedness as agent, mandatary, custodian and pledgee for the benefit of the Agents, the Lenders and the Lender Counterparties, the whole notwithstanding the provisions of Section 32 of the An Act respecting the Special Powers of Legal Persons (Quebec). The execution prior to the date hereof by the Collateral Agent of any deed of hypothec or other security documents made pursuant to the laws of the Province of Quebec, is hereby ratified and confirmed. Any person who becomes a Lender, Issuing Bank, an Agent or a Lender Counterparty shall be deemed to have consented to and ratified the foregoing appointment of each of the Collateral Agent as fondé de pouvoir, agent, mandatary and custodian on behalf of all Agents, Issuing Banks, Lenders and the Lender Counterparties, including such person. For greater certainty, the Collateral Agent, when acting as the holder of an irrevocable power of attorney (fondé de pouvoir), shall have the same rights, powers, immunities, indemnities and exclusions from liability as are prescribed in favour of the Collateral Agent in this Agreement, which shall apply mutatis mutandis. In the event of the resignation and appointment of a successor Collateral Agent, such successor of the Collateral Agent shall also act as the holder of an irrevocable power of attorney (fondé de pouvoir), and as agent, mandatary and custodian for the purposes set forth above. Without limiting the foregoing, none of such Lenders shall have or be deemed to have a fiduciary relationship with any Lender. The Lenders are not partners or co-venturers, and no Lender shall be liable for the acts or omissions of, or (except as otherwise set forth herein in case of the Administrative Agent) authorized to act for, any other Lender.

  • No Security The parties hereto understand and agree that (i) the contingent rights to receive the Earn-out Payment shall not be represented by any form of certificate or other instrument, are not transferable, except by operation of Laws relating to descent and distribution, divorce and community property, and do not constitute an equity or ownership interest in the Buyer, (ii) the Seller shall not have any rights as a security holder of the Buyer as a result of the Seller's contingent right to receive the Earn-out Payment hereunder, and (iii) no interest is payable with respect to the Earn-out Payment.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • No Security Interest Holders shall have no security interest in any of the Company’s assets or other collateral. Nothing in this Revenue Sharing Agreement or in the Notes, express or implied, shall be construed to constitute a security interest under the Uniform Commercial Code or similar legislation, now in eRect or hereafler enacted and made effective, in any jurisdiction.

  • Privacy and Data Security (a) The parties will keep confidential any information regarding the Trust, the Variable Accounts, and Contract Owners received in connection with providing services and meeting their respective obligations hereunder, except: (a) as necessary to provide the services or otherwise meet their respective obligations under this Agreement; (b) as necessary to comply with applicable law; and (c) information regarding the Trust or Variable Accounts which is otherwise publicly available. The parties will maintain internal safekeeping procedures to safeguard and protect the confidentiality of the data transmitted to another party or its designees or agents in accordance with Section 248.11 of Regulation S-P (17 CFR 248.1–248.30) (“Reg S-P”) and any other applicable federal or state privacy laws and regulations, including without limitation 201 CFR 17.00 et seq. and applicable security breach notification regulations (collectively “Privacy Laws”). Each party shall use such data solely to effect the services contemplated herein, and none of the parties will directly, or indirectly through an affiliate, disclose any non-public personal information protected under Privacy Laws (“Non-public Personal Information”) received from another party to any person that is not an affiliate, designee, service provider, or agent of the receiving party and provided that any such information disclosed to an affiliate, designee, service provider, or agent will be under the same or substantially similar contractual limitations on use and non-disclosure and will comply with all legal requirements. The Company will not use information, including Non-public Personal Information, directly or indirectly provided to it by Nationwide or its designees or agents pursuant to this Agreement for the purpose of marketing to Contract Owners or any other similar purpose, except as may be agreed by the parties hereto. Except for confidential information consisting of Non-public Personal Information, which will be governed in all respects in accordance with the immediately preceding sentence, confidential information does not include information which (i) was publicly known and/or was in the possession of the party receiving confidential information (“Receiving Party”) from other sources prior to the Receiving Party’s receipt of confidential information from the party disclosing confidential information (“Disclosing Party”), or (ii) is or becomes publicly available other than as a result of a disclosure by the Receiving Party or its representatives, or (iii) is or becomes available to the Receiving Party on a non-confidential basis from a source (other than the Disclosing Party) which, to the best of the Receiving Party’s knowledge, is not prohibited from disclosing such information to the Receiving Party by a legal, contractual, or fiduciary obligation to the Disclosing Party, or (iv) describes the fees payable to Nationwide under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.