NETWORK LAYER SECURITY Sample Clauses

NETWORK LAYER SECURITY. Provider will ensure the prevention and detection of fraud, abuse, or other inappropriate use or electronic access to systems on the network layers as set forth in Schedule M, Security Procedures.
AutoNDA by SimpleDocs

Related to NETWORK LAYER SECURITY

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • Data Security A. Identity Access Management. BNY Mellon will implement reasonable and industry recognized user access rules for users accessing Customer Data based on the need to know and the principle of least privilege, and including user ID and password requirements, session timeout and re-authentication requirements, unsuccessful login attempt limits, privileged access limits and multifactor authentication or equivalent safeguard where risk factors indicate that single factor authentication is inadequate.

  • Multiple Security If (a) the Premises shall consist of one or more parcels, whether or not contiguous and whether or not located in the same county, or (b) in addition to this Mortgage, Mortgagee shall now or hereafter hold one or more additional mortgages, liens, deeds of trust or other security (directly or indirectly) for the Indebtedness upon other property in the State in which the Premises are located (whether or not such property is owned by Mortgagor or by others) or (c) both the circumstances described in clauses (a) and (b) shall be true, then to the fullest extent permitted by law, Mortgagee may, at its election, commence or consolidate in a single foreclosure action all foreclosure proceedings against all such collateral securing the Indebtedness (including the Mortgaged Property), which action may be brought or consolidated in the courts of any county in which any of such collateral is located. Mortgagor acknowledges that the right to maintain a consolidated foreclosure action is a specific inducement to Mortgagee to extend the Indebtedness, and Mortgagor expressly and irrevocably waives any objections to the commencement or consolidation of the foreclosure proceedings in a single action and any objections to the laying of venue or based on the grounds of forum non conveniens which it may now or hereafter have. Mortgagor further agrees that if Mortgagee shall be prosecuting one or more foreclosure or other proceedings against a portion of the Mortgaged Property or against any collateral other than the Mortgaged Property, which collateral directly or indirectly secures the Indebtedness, or if Mortgagee shall have obtained a judgment of foreclosure and sale or similar judgment against such collateral, then, whether or not such proceedings are being maintained or judgments were obtained in or outside the State in which the Premises are located, Mortgagee may commence or continue foreclosure proceedings and exercise its other remedies granted in this Mortgage against all or any part of the Mortgaged Property and Mortgagor waives any objections to the commencement or continuation of a foreclosure of this Mortgage or exercise of any other remedies hereunder based on such other proceedings or judgments, and waives any right to seek to dismiss, stay, remove, transfer or consolidate either any action under this Mortgage or such other proceedings on such basis. Neither the commencement nor continuation of proceedings to foreclose this Mortgage nor the exercise of any other rights hereunder nor the recovery of any judgment by Mortgagee in any such proceedings shall prejudice, limit or preclude Mortgagee's right to commence or continue one or more foreclosure or other proceedings or obtain a judgment against any other collateral (either in or outside the State in which the Premises are located) which directly or indirectly secures the Indebtedness, and Mortgagor expressly waives any objections to the commencement of, continuation of, or entry of a judgment in such other proceedings or exercise of any remedies in such proceedings based upon any action or judgment connected to this Mortgage, and Mortgagor also waives any right to seek to dismiss, stay, remove, transfer or consolidate either such other proceedings or any action under this Mortgage on such basis. It is expressly understood and agreed that to the fullest extent permitted by law, Mortgagee may, at its election, cause the sale of all collateral which is the subject of a single foreclosure action at either a single sale or at multiple sales conducted simultaneously and take such other measures as are appropriate in order to effect the agreement of the parties to dispose of and administer all collateral securing the Indebtedness (directly or indirectly) in the most economical and least time-consuming manner.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Replacement of Note 2.1 In the event that this Note is mutilated, destroyed, lost or stolen, Payor shall, at its sole expense, execute, register and deliver a new Note, in exchange and substitution for this Note, if mutilated, or in lieu of and substitution for this Note, if destroyed, lost or stolen. In the case of destruction, loss or theft, Payee shall furnish to Payor indemnity reasonably satisfactory to Payor, and in any such case, and in the case of mutilation, Payee shall also furnish to Payor evidence to its reasonable satisfaction of the mutilation, destruction, loss or theft of this Note and of the ownership thereof. Any replacement Note so issued shall be in the same outstanding principal amount as this Note and dated the date to which interest shall have been paid on this Note or, if no interest shall have yet been paid, dated the date of this Note.

  • Restrictive Legend Events; Cashless Exercise Under Certain Circumstances (i) The Company shall use it reasonable best efforts to maintain the effectiveness of the Registration Statement and the current status of the prospectus included therein or to file and maintain the effectiveness of another registration statement and another current prospectus covering the Warrants and the Warrant Shares at any time that the Warrants are exercisable. The Company shall provide to the Warrant Agent and each Holder prompt written notice of any time that the Company is unable to deliver the Warrant Shares via DTC transfer or otherwise without restrictive legend because (A) the Commission has issued a stop order with respect to the Registration Statement, (B) the Commission otherwise has suspended or withdrawn the effectiveness of the Registration Statement, either temporarily or permanently, (C) the Company has suspended or withdrawn the effectiveness of the Registration Statement, either temporarily or permanently, (D) the prospectus contained in the Registration Statement is not available for the issuance of the Warrant Shares to the Holder or (E) otherwise (each a “Restrictive Legend Event”). To the extent that the Warrants cannot be exercised as a result of a Restrictive Legend Event or a Restrictive Legend Event occurs after a Holder has exercised Warrants in accordance with the terms of the Warrants but prior to the delivery of the Warrant Shares, the Company shall, at the election of the Holder, which shall be given within five (5) days of receipt of such notice of the Restrictive Legend Event, either (A) rescind the previously submitted Election to Purchase and the Company shall return all consideration paid by registered holder for such shares upon such rescission or (B) treat the attempted exercise as a cashless exercise as described in paragraph (ii) below and refund the cash portion of the exercise price to the Holder.

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

Time is Money Join Law Insider Premium to draft better contracts faster.