Security Clause Samples
A Security clause establishes the rights and obligations related to collateral or guarantees provided to secure the performance of contractual obligations. Typically, this clause outlines what assets or interests are being pledged, the conditions under which the security can be enforced, and the procedures for releasing the security once obligations are fulfilled. For example, it may specify that a borrower must provide a lien over certain property or that a guarantor is required for a loan. The core practical function of a Security clause is to protect the interests of the party receiving the security by reducing the risk of non-performance or default.
POPULAR SAMPLE Copied 90 times
Security. Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.
Security. Any disclosure or removal of any District matter or property by Contractor shall be cause for immediate termination of this Contract. Contractor shall bear sole responsibility for any liability including, but not limited to attorney fees, resulting from any action or suit brought against District because of Contractor’s willful or negligent release of information, documents, or property contained in or on District property. District hereby deems all information, documents, and property contained in or on District property privileged and confidential.
Security. Each party shall take reasonable security precautions, at least as great as the precautions it takes to protect its own confidential information, to keep confidential the Confidential Information.
Security. 16.1 If requested to do so by the Buyer, before entering into this Call-Off Contract the Supplier will, within 15 Working Days of the date of this Call-Off Contract, develop (and obtain the Buyer’s written approval of) a Security Management Plan and an Information Security Management System. After Buyer approval the Security Management Plan and Information Security Management System will apply during the Term of this Call-Off Contract. Both plans will comply with the Buyer’s security policy and protect all aspects and processes associated with the delivery of the Services.
16.2 The Supplier will use all reasonable endeavours, software and the most up-to-date antivirus definitions available from an industry-accepted antivirus software seller to minimise the impact of Malicious Software.
16.3 If Malicious Software causes loss of operational efficiency or loss or corruption of Service Data, the Supplier will help the Buyer to mitigate any losses and restore the Services to operating efficiency as soon as possible.
16.4 Responsibility for costs will be at the:
16.4.1 Supplier’s expense if the Malicious Software originates from the Supplier software or the Service Data while the Service Data was under the control of the Supplier, unless the Supplier can demonstrate that it was already present, not quarantined or identified by the Buyer when provided
16.4.2 Buyer’s expense if the Malicious Software originates from the Buyer software or the Service Data, while the Service Data was under the Buyer’s control
16.5 The Supplier will immediately notify the Buyer of any breach of security of ▇▇▇▇▇’s Confidential Information (and the Buyer of any Buyer Confidential Information breach). Where the breach occurred because of a Supplier Default, the Supplier will recover the Buyer’s Confidential Information however it may be recorded.
16.6 Any system development by the Supplier should also comply with the government’s ‘10 Steps to Cyber Security’ guidance:
16.7 If a Buyer has requested in the Order Form that the Supplier has a Cyber Essentials certificate, the Supplier must provide the Buyer with a valid Cyber Essentials certificate (or equivalent) required for the Services before the Start date.
Security. Section 31.1. Tenant shall deposit with Landlord on the signing of this Lease the sum of the Security Amount for the 1st Security Period, or at Tenant's option, a "clean," unconditional, irrevocable and transferable letter of credit (the "Letter of Credit") in the same amount, satisfactory to Landlord, issued by and drawn on a bank satisfactory to Landlord and which is a member of the New York Clearing House Association, for the account of Landlord, for a term of not less than one (1) year, as security for the faithful performance and observance by Tenant of the terms, covenants, conditions and provisions of this Lease, including, without limitation, the surrender of possession of the Premises to Landlord as herein provided. If an Event of Default shall occur and be continuing, Landlord may apply the whole or any part of the security so deposited, or present the Letter of Credit for payment and apply the whole or any part of the proceeds thereof, as the case may be, (i) toward the payment of any Fixed Rent, Escalation Rent or any other item of Rental as to which Tenant is in default, (ii) toward any sum which Landlord may expend or be required to expend by reason of Tenant's default in respect of any of the terms, covenants and conditions of this Lease, including, without limitation, any damage, liability or expense (including, without limitation, reasonable attorneys' fees and disbursements) incurred or suffered by Landlord, and (iii) toward any damage or deficiency incurred or suffered by Landlord in the reletting of the Premises, whether such damages or deficiency accrue or accrues before or after summary proceedings or other re-entry by Landlord. If Landlord applies or retains any part of the proceeds of the Letter of Credit or the security so deposited, as the case may be, Tenant, upon demand, shall deposit with Landlord the amount so applied or retained so that Landlord shall have the full deposit on hand at all times during the Term. If Tenant shall fully and faithfully comply with all of the terms, provisions, covenants and conditions of this Lease, the Letter of Credit or the security, as the case may be, shall be returned to Tenant after the Expiration Date and after delivery of possession of the Premises to Landlord. In the event of a sale or leasing of the Real Property or the Building, Landlord shall have the right to transfer the Letter of Credit or security, as the case may be, to the vendee or lessee and Landlord shall thereupon be released...
Security. CONTRACTOR shall ensure the continuous security of all computerized data 26 systems containing DHCS PI and PII. CONTRACTOR shall protect paper documents containing ▇▇ ▇▇▇▇ ▇▇ and PII. These steps shall include, at a minimum:
28 1) Complying with all of the data system security precautions listed in Subparagraph
Security. If the Custodian advances cash or Securities to the Fund for any purpose, either at the Trust's request or as otherwise contemplated in this Agreement, or in the event that the Custodian or its nominee incurs, in connection with its performance under this Agreement, any claim, demand, loss, expense or liability (including reasonable attorneys' fees) (except such as may arise from its or its nominee's bad faith, negligence or willful misconduct), then, in any such event, any property at any time held for the account of the Fund shall be security therefor, and should the Fund fail promptly to repay or indemnify the Custodian, the Custodian shall be entitled to utilize available cash of such Fund and to dispose of other assets of such Fund to the extent necessary to obtain reimbursement or indemnification.
Security. Contractor warrants, covenants and represents that, in the performance of the Contract, Contractor, its agents, Subcontractors, officers, distributors, resellers and employees will comply fully with all security procedures of the Authorized User set forth in the Contract or Purchase Order or otherwise communicated in advance to the Contractor including but not limited to physical, facility, documentary and cyber security rules, procedures and protocols.
Security. Each of FIIOC and FSC represents and warrants that, to the best of its knowledge, the various procedures and systems which it has implemented with regard to the safeguarding from loss or damage attributable to fire, theft or any other cause (including provision for twenty–four hours a day restricted access) of the Trust's blank checks, certificates, records and other data and FIIOC’s and FSC's records, data, equipment, facilities and other property used in the performance of its obligations hereunder are adequate, and that it will make such changes therein from time to time as in its judgment are required for the secure performance of its obligations hereunder. FIIOC and FSC shall review such systems and procedures on a periodic basis and the Trust shall have access to review these systems and procedures.
Security. 16.1 If requested to do so by the Buyer, before entering into this Call-Off Contract the Supplier will, within 15 Working Days of the date of this Call-Off Contract, develop (and obtain the Buyer’s written approval of) a Security Management Plan and an Information Security
