Protection 6 Sample Clauses

Protection 6. FUNDER may proceed to protect and enforce its right and remedies by lawsuit. In any such lawsuit, if FUNDER recovers a Judgment against Merchant, Merchant shall be liable for all of FUNDER’s costs of the lawsuit, including but not limited to all reasonable attorneys’ fees and court costs.
AutoNDA by SimpleDocs

Related to Protection 6

  • Protection The Asset Representations Reviewer will take reasonable measures to protect the secrecy of and avoid disclosure and unauthorized use of Confidential Information, including those measures that it takes to protect its own confidential information and not less than a reasonable standard of care. The Asset Representations Reviewer acknowledges that Personally Identifiable Information is also subject to the additional requirements in Section 4.09.

  • PROTECTION OF THIRD PARTIES No person (including a purchaser) dealing with the Collateral Agent or a Receiver or its or his agents will be concerned to enquire:

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Protection of Trade Secrets The Executive agrees to maintain in strict confidence and, except as necessary to perform his duties for the Employer, the Executive agrees not to use or disclose any Trade Secrets of the Employer during or after his employment. “Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique, process, drawing, cost data or customer list, that: (i) derives economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Protection of Documents All documents, records and files, in any media of whatever kind and description, relating to the business, present or otherwise, of the Company or any of its Affiliates, and any copies, in whole or in part, thereof (the “Documents”), whether or not prepared by you shall be the sole and exclusive property of the Company. You agree to safeguard all Documents and to surrender to the Company, at the time your employment terminates or at such earlier time or times as the Committee or its designee may specify, all Documents then in your possession or control.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Price Protection If, on the Vesting Date, the aggregate Market Price of the shares of Common Stock issuable upon settlement of the Units, is less than $1.50 per share, then the Company agrees to grant and issue to you, for no additional consideration, additional Units (“Additional Units”) such that the aggregate Market Price of the Common Stock underlying the Units previously issued, when added to the Market Price of the Common Stock underlying such Additional Units, shall equal at least $15,000 for each completed month of service. For the purposes hereof, “Market Price” at any date shall be deemed to be (i) if the principal trading market for such securities is any exchange, the last reported sale price, on each Trading Day for which determination is made as officially reported on any consolidated tape, (ii) if the principal market for such securities is the over-the-counter market, the closing prices (or, if no closing price, the closing bid price) on such Trading Days as set forth by Nasdaq or the OTC.QB of the OTC Markets Group, Inc. (whichever is the principal market for the Company’s Common Shares) as reported at xxxx://xxxxxxx.xxxxx.xxx or, (iii) if the security is not quoted on Nasdaq or the OTC.QB, the average bid and asked price as set forth on XXX.Xxxx of the OTC Markets Group, Inc. listing such securities for such day. Notwithstanding the foregoing, if there is no reported closing price or bid price, as the case may be, on any of the ten trading days preceding the event requiring a determination of Market Price hereunder, then the Market Price shall be determined in good faith by resolution of the Board of Directors of the Company, based on the best information available to it.

  • Protection of Developments The Contractor does hereby agree that, both before and after the termination of this Agreement, the Contractor shall perform such further acts and execute and deliver such further instruments, writings, documents and assurances (including, without limitation, specific assignments and other documentation which may be required anywhere in the world to register evidence of ownership of the rights assigned pursuant hereto) as the Company shall reasonably require in order to give full effect to the true intent and purpose of the assignment made under Section 5.3 hereof. If the Company is for any reason unable, after reasonable effort, to secure execution by the Contractor on documents needed to effect any registration or to apply for or prosecute any right or protection relating to the Developments, the Contractor hereby designates and appoints the Company and its duly authorized officers and agents as the Contractor’s agent and attorney to act for and in the Contractor’s behalf and stead to execute and file any such document and do all other lawfully permitted acts necessary or advisable in the opinion of the Company to effect such registration or to apply for or prosecute such right or protection, with the same legal force and effect as if executed by the Contractor.

Time is Money Join Law Insider Premium to draft better contracts faster.