Compliance with Security Requirements Sample Clauses

Compliance with Security Requirements. (a) The Customer shall comply with all Applicable Laws pertaining to security requirements, the Facility Security Plan and any of the Operator’s standing instructions which may be operative at such time. The Operator shall have the right to refuse provision of the Terminal Services to the Customer in the event of the Customer’s non- compliance with any of such laws, regulations, instructions or requirements of the Operator. If a Vessel is at the Terminal at the time of such non-compliance, the Customer undertakes to meet any additional costs resulting from such non- compliance and/or ensure that the berth is vacated immediately upon receipt of written request from the Operator.
AutoNDA by SimpleDocs
Compliance with Security Requirements. Following the Effective Time, in the event any member of a Party’s Group remains party to any contract with any Governmental Entity (the “Contract Party”), which contract is to be novated to a member of the other Party’s Group (the “Novation Party”) following the Effective Time in accordance with this Agreement, the Contract Party shall take all reasonable measures necessary for such member of the Contract Party Group to maintain any security clearances required to be maintained pursuant to such agreement until such contract is novated to the applicable member of the Novation Party Group in accordance herewith.
Compliance with Security Requirements. Upon submitting a request for evaluation of a Product to GP pursuant to Section 2.4, Vendor thereby represents and warrants that (i) the conditions contained in Section 2.4 were fully satisfied; (ii) the production of all corresponding Products is and will be in conformance with the Security Requirements; (iii) the Product samples used to generate the Reports for such Product are materially identical to the corresponding Products that will be produced by Vendor or its suppliers and agents; and (iv) the Report results are a fair and accurate representation of Product performance and that Vendor does not dispute the validity of the Report results.
Compliance with Security Requirements. Section 901.
Compliance with Security Requirements. To the extent that, in connection with a United States government contract, an agency of the United States government or a contractor requires the Company to restrict access to any properties or information reasonably related to such contract on the basis of Applicable Law with respect to United States national security matters and to the extent that other Applicable Law requires the Company to restrict access to any properties or information and, in accordance with such restrictions, access to certain properties or information may not be given to any Director elected by the Class A Holders without appropriate security clearance, such Director will not be given access to such properties or information and may not participate in deliberations of the Board of Directors or the board of directors of any of the Company's Subsidiaries in which such information with respect to such properties is disclosed. Any such exclusion shall be reflected accurately in the minutes of such deliberations. Without limiting the generality of the foregoing, no Class A Director shall (i) have access to classified information or controlled unclassified information entrusted to the Company except as permissible under the United States Department of Defense Industrial Security Program (the "DISP") and applicable United States laws and regulations, (ii) either seek or accept classified information or controlled unclassified information entrusted to the Company, except as permissible under the DISP or applicable United States laws and regulations, or (iii) fail to advise any committee established by the Company to monitor compliance with national security matters promptly if such Class A Director reasonably believes any violations or attempted violations of, or actions inconsistent with, Applicable Laws or contractual provisions relating to national security matters have occurred.
Compliance with Security Requirements. The Health Services Manager must:
Compliance with Security Requirements. Payment Terminals and Payment Solutions All payment terminals and payment solutions used by the Merchant must comply Rapyd‘s standards and with the applicable standards established by the Card Associations and by national legislation at any given time, and must be approved by Xxxxx, including technical and security requirements. The Merchant is required to comply with the verification procedures and security requirements or with such rules as Rapyd may otherwise have informed the Merchant of at any given time, including 3-D Secure and other measures to avoid fraudulent transactions. The Merchant must ensure that no unauthorised person(s) have access to payment terminals or payment solutions. The Merchant is responsible for ensuring that the payment terminals are protected against unauthorised use, including the installation of skimming equipment. Merchants that use Cardholder-Activated Terminals must inspect them at least once a day in order to ensure that the payment terminals have not been tampered with. Rapyd may require that the Merchant install anti-skimming equipment and/or camera surveillance in cases where Xxxxx deems that there is a risk of skimming and/or “money traps”. If the Merchant’s payment terminals are skimmed, Rapyd may request the Merchant to inspect the payment terminals more often. The compromising of systems The Merchant must inform Xxxxx immediately of any unauthorised access or suspicion of unauthorised access to the Merchant’s systems containing Card Data in case of skimming, attempted skimming, compromising or suspected compromising of Card Data. In the event that systems containing Card Data handled by the Merchant or by the Merchant’s external suppliers are compromised, or reasonable suspected to be compromised, Xxxxx reserves the right to impose charges on the Merchant to the same extent as those imposed on Rapyd by the Card Associations. The Merchant is liable for any loss or damage incurred as a result of Payment Card fraud, costs associated with the issuing of new Payment Cards, as well as costs associated with the investigation required into the security breach or a suspected breach. Such investigations must only be performed by a certified data security firm approved by the Card Associations. The Merchant is obliged to cooperate with and assist Xxxxx, the chosen data security firm and any relevant public authorities in the event of a compromise or a suspected compromise. While the investigation is ongoing, Xxxxx is entitled to...
AutoNDA by SimpleDocs
Compliance with Security Requirements. Operator agrees to observe all security laws, rules, regulations and requirements of the DHS, FAA, TSA, and City applicable to Operator’s operations, as now or hereafter amended or promulgated, including, without limitation, Title 49, Parts 1500 et al., of the Code of Federal Regulations, to the extent applicable to Operator and Operator’s activities hereunder.
Compliance with Security Requirements. Business Associate shall comply, and shall ensure agents and subcontractors comply with the Security Requirements of 45 CFR with respect to electronic transmission of PHI.
Compliance with Security Requirements hCentive shall comply and shall cause all of its Personnel performing Services under this Agreement to comply with all security requirements set forth in this Agreement, the Commonwealth Terms and Conditions, and Commonwealth of Massachusetts Executive Order 504. hCentive shall complete and sign the Executive Order 504 Contractor Certification Form set forth on Exhibit K.
Time is Money Join Law Insider Premium to draft better contracts faster.