Protection of the TXX Hortons System Sample Clauses

Protection of the TXX Hortons System 
AutoNDA by SimpleDocs

Related to Protection of the TXX Hortons System

  • Protection of PFPC Trust PFPC Trust shall be indemnified by the Fund and without liability for any action PFPC Trust takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC Trust receives from or on behalf of the Fund or from counsel and which PFPC Trust believes, in good faith, to be consistent with those directions or advice or Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC Trust (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of the Adviser The Adviser shall not be liable to the Fund or to any portfolio series thereof for any action taken or omitted to be taken by the Adviser in connection with the performance of any of its duties or obligations under this Agreement or otherwise as an investment adviser of the Fund or such series, and the Fund or each portfolio series thereof involved, as the case may be, shall indemnify the Adviser and hold it harmless from and against all damages, liabilities, costs and expenses (including reasonable attorneys’ fees and amounts reasonably paid in settlement) incurred by the Adviser in or by reason of any pending, threatened or completed action, suit, investigation or other proceeding (including an action or suit by or in the right of the Fund or any portfolio series thereof or its security holders) arising out of or otherwise based upon any action actually or allegedly taken or omitted to be taken by the Adviser in connection with the performance of any of its duties or obligations under this Agreement or otherwise as an investment adviser of the Fund or such series. Notwithstanding the preceding sentence of this Paragraph 8 to the contrary, nothing contained herein shall protect or be deemed to protect the Adviser against or entitle or be deemed to entitle the Adviser to indemnification in respect of, any liability to the Fund or to any portfolio series thereof or its security holders to which the Adviser would otherwise be subject by reason of willful misfeasance, bad faith or gross negligence in the performance of its duties or by reason of its reckless disregard of its duties and obligations under this Agreement. Determinations of whether and the extent to which the Adviser is entitled to indemnification hereunder shall be made by reasonable and fair means, including (a) a final decision on the merits by a court or other body before whom the action, suit or other proceeding was brought that the Adviser was not liable by reason of willful misfeasance, bad faith, gross negligence or reckless disregard of its duties, or (b) in the absence of such a decision, a reasonable determination, based upon a review of the facts, that the Adviser was not liable by reason of such misconduct by (i) the vote of a majority of a quorum of the Trustees of the Fund who are neither “interested persons” of the Fund (as defined in Section 2(a)(19) of the Investment Company Act of 1940) nor parties to the action, suit or other proceeding, or (ii) an independent legal counsel in a written opinion.

  • Information Systems (a) The MA Organization must:

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • PROTECTION OF GOODWILL You acknowledge that the Company is providing you with this Restricted Stock Award in connection with and in consideration for your promises and covenants contained herein. Specifically, in consideration for the Restricted Stock Award, which you acknowledge provides a material incentive for you to grow, develop and protect the goodwill and confidential and proprietary information of the Company, you agree that the Restricted Stock Award (itself and in combination with any other awards made to you) constitutes independent and sufficient consideration for all non-competition, non-solicitation and confidentiality covenants between you and the Company, and agree and acknowledge that you will fully abide by each of such covenants. You further acknowledge that your promise to fully abide by each of the protective covenants referenced above is a material inducement for the Company to provide you with the Restricted Stock Award.

  • Administration and Risk Management Employees of Federated Advisory Services Company provide support to portfolio managers and other employees of affiliated advisers. Such services may include development of risk management programs, production of portfolio and compliance reports for clients and/or fund Boards, coordination of client portfolios and related fixed income trade execution implementation and administration, completion of required broker and custody documentation, development and documentation of operational procedures, coordination of proxy voting activities, on-site support of hardware and software, etc.”

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Systems The details of any systems work will be determined after a thorough business analysis. System's work will be billed on a time and material basis. Investors Bank provides an allowance of 10 systems hours for data extract set up and reporting extract set up. Additional hours will be billed on a time and material basis.

Time is Money Join Law Insider Premium to draft better contracts faster.