Other Security Standards Sample Clauses

Other Security Standards. Subject to Article 4 (Change Order Procedures) and Section 13.7 (Changes to Policies and Security Standards), the Customer Group and Provider will jointly agree in good faith to other security requirements that may be necessary to make the Customer Group and Provider network and Internet environments secure. Provider will immediately, after discovering any material breach of the Customer Group’s security guidelines, inform the Customer Group of such breach.
AutoNDA by SimpleDocs

Related to Other Security Standards

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Other Security and Guaranties The Agent, may, without notice or demand and without affecting the Borrower's obligations hereunder, from time to time: (a) take from any Person and hold collateral (other than the Collateral) for the payment of all or any part of the Obligations and exchange, enforce or release such collateral or any part thereof; and (b) accept and hold any endorsement or guaranty of payment of all or any part of the Obligations and release or substitute any such endorser or guarantor, or any Person who has given any Lien in any other collateral as security for the payment of all or any part of the Obligations, or any other Person in any way obligated to pay all or any part of the Obligations.

  • Relation to Other Security Documents The provisions of this Agreement shall be read and construed with the other Loan Documents referred to below in the manner so indicated.

  • Other Securities The Trustees may, subject to the Fundamental Policies and the requirements of the 1940 Act, authorize and issue such other securities of the Trust as they determine to be necessary, desirable or appropriate, having such terms, rights, preferences, privileges, limitations and restrictions as the Trustees see fit, including preferred interests, debt securities or other senior securities. To the extent that the Trustees authorize and issue preferred shares of any class or series, they are hereby authorized and empowered to amend or supplement this Declaration as they deem necessary or appropriate, including to comply with the requirements of the 1940 Act or requirements imposed by the rating agencies or other Persons, all without the approval of Shareholders. Any such supplement or amendment shall be filed as is necessary. The Trustees are also authorized to take such actions and retain such persons as they see fit to offer and sell such securities.

  • No Other Securities The only securities in the capital of Xxxxxx beneficially owned or controlled, directly or indirectly, by the Shareholder are his, her or its Shareholder Shares and the Shareholder has no other agreement or option, or right or privilege (whether by law, pre-emptive or contractual) capable of becoming an agreement or option, for the purchase or acquisition by the Shareholder or transfer to the Shareholder of additional securities in the capital of Xxxxxx.

  • Inclusion of Other Securities The Company shall not register securities (other than Registrable Securities) for sale for the account of any Person other than the Company in any registration requested pursuant to Section 3.1(a) unless permitted to do so by the written consent of holders holding at least a majority (by number of shares) of the Registrable Securities proposed to be sold in such registration.

  • No Other Security Interests 20. For each of the Receivables, reviewed the Data Tape to determine that each Receivable is only in one pool of receivables, determined that the executed transaction documents contained a Security Interest opinion of outside counsel in connection with the transaction, and determined that a recent annual UCC opinion was issued. Pooling Agreement Appendix B (7) – One Original Contract

  • EXPORT RESTRICTIONS EXPORT OF THE SOFTWARE IS PROHIBITED BY UNITED STATES LAW. THE FUND MAY NOT UNDER ANY CIRCUMSTANCES RESELL, DIVERT, TRANSFER, TRANSSHIP OR OTHERWISE DISPOSE OF THE SOFTWARE (IN ANY FORM) IN OR TO ANY OTHER COUNTRY. IF CUSTODIAN DELIVERED THE SOFTWARE TO THE FUND OUTSIDE OF THE UNITED STATES, THE SOFTWARE WAS EXPORTED FROM THE UNITED STATES IN ACCORDANCE WITH THE EXPORTER ADMINISTRATION REGULATIONS. DIVERSION CONTRARY TO U.S. LAW IS PROHIBITED. The Fund hereby authorizes Custodian to report its name and address to government agencies to which Custodian is required to provide such information by law.

Time is Money Join Law Insider Premium to draft better contracts faster.