Client’s Security Sample Clauses

Client’s Security. 5.1 Client is responsible for acts or omissions made by any third parties using Client’s identification data or Client’s account, whether or not such use is fraudulent; Clients agree to indemnify SDGE against any claims which may result from such acts or omissions.
AutoNDA by SimpleDocs

Related to Client’s Security

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Premises Security 10.1 Security of premises and control of access.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Protection of Collateral Agent’s Security On a continuing basis, each Pledgor shall, at its sole cost and expense, (i) promptly following its becoming aware thereof, notify the Collateral Agent of any adverse determination in any proceeding or the institution of any proceeding in any federal, state or local court or administrative body or in the United States Patent and Trademark Office or the United States Copyright Office regarding any Material Intellectual Property Collateral, such Pledgor’s right to register such Material Intellectual Property Collateral or its right to keep and maintain such registration in full force and effect, (ii) maintain all Material Intellectual Property Collateral as presently used and operated, (iii) not permit to lapse or become abandoned any Material Intellectual Property Collateral, and not settle or compromise any pending or future litigation or administrative proceeding with respect to any such Material Intellectual Property Collateral, in either case except as shall be consistent with commercially reasonable business judgment, (iv) upon such Pledgor obtaining knowledge thereof, promptly notify the Collateral Agent in writing of any event which may be reasonably expected to materially and adversely affect the value or utility of any Material Intellectual Property Collateral or the rights and remedies of the Collateral Agent in relation thereto including a levy or threat of levy or any legal process against any Material Intellectual Property Collateral, (v) not license any Intellectual Property Collateral other than licenses entered into by such Pledgor in, or incidental to, the ordinary course of business, or amend or permit the amendment of any of the licenses in a manner that materially and adversely affects the right to receive payments thereunder, or in any manner that would materially impair the value of any Intellectual Property Collateral or the Lien on and security interest in the Intellectual Property Collateral created therein hereby, without the consent of the Collateral Agent, (vi) diligently keep adequate records respecting all Intellectual Property Collateral and (vii) furnish to the Collateral Agent from time to time upon the Collateral Agent’s request therefor reasonably detailed statements and amended schedules further identifying and describing the Intellectual Property Collateral and such other materials evidencing or reports pertaining to any Intellectual Property Collateral as the Collateral Agent may from time to time request.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

Time is Money Join Law Insider Premium to draft better contracts faster.