Security Clause Samples

A Security clause establishes the rights and obligations related to collateral or guarantees provided to secure the performance of contractual obligations. Typically, this clause outlines what assets or interests are being pledged, the conditions under which the security can be enforced, and the procedures for releasing the security once obligations are fulfilled. For example, it may specify that a borrower must provide a lien over certain property or that a guarantor is required for a loan. The core practical function of a Security clause is to protect the interests of the party receiving the security by reducing the risk of non-performance or default.
POPULAR SAMPLE Copied 90 times
Security. Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.
Security. CONTRACTOR shall ensure the continuous security of all computerized data 26 systems containing DHCS PI and PII. CONTRACTOR shall protect paper documents containing ▇▇ ▇▇▇▇ ▇▇ and PII. These steps shall include, at a minimum: 28 1) Complying with all of the data system security precautions listed in Subparagraph
Security. Any disclosure or removal of any District matter or property by Contractor shall be cause for immediate termination of this Contract. Contractor shall bear sole responsibility for any liability including, but not limited to attorney fees, resulting from any action or suit brought against District because of Contractor’s willful or negligent release of information, documents, or property contained in or on District property. District hereby deems all information, documents, and property contained in or on District property privileged and confidential.
Security. 16.1 If requested to do so by the Buyer, before entering into this Call-Off Contract the Supplier will, within 15 Working Days of the date of this Call-Off Contract, develop (and obtain the Buyer’s written approval of) a Security Management Plan and an Information Security Management System. After Buyer approval the Security Management Plan and Information Security Management System will apply during the Term of this Call-Off Contract. Both plans will comply with the Buyer’s security policy and protect all aspects and processes associated with the delivery of the Services. 16.2 The Supplier will use all reasonable endeavours, software and the most up-to-date antivirus definitions available from an industry-accepted antivirus software seller to minimise the impact of Malicious Software. 16.3 If Malicious Software causes loss of operational efficiency or loss or corruption of Service Data, the Supplier will help the Buyer to mitigate any losses and restore the Services to operating efficiency as soon as possible. 16.4 Responsibility for costs will be at the: 16.4.1 Supplier’s expense if the Malicious Software originates from the Supplier software or the Service Data while the Service Data was under the control of the Supplier, unless the Supplier can demonstrate that it was already present, not quarantined or identified by the Buyer when provided 16.4.2 Buyer’s expense if the Malicious Software originates from the Buyer software or the Service Data, while the Service Data was under the Buyer’s control 16.5 The Supplier will immediately notify the Buyer of any breach of security of ▇▇▇▇▇’s Confidential Information (and the Buyer of any Buyer Confidential Information breach). Where the breach occurred because of a Supplier Default, the Supplier will recover the Buyer’s Confidential Information however it may be recorded. 16.6 Any system development by the Supplier should also comply with the government’s ‘10 Steps to Cyber Security’ guidance: 16.7 If a Buyer has requested in the Order Form that the Supplier has a Cyber Essentials certificate, the Supplier must provide the Buyer with a valid Cyber Essentials certificate (or equivalent) required for the Services before the Start date.
Security. Each party shall take reasonable security precautions, at least as great as the precautions it takes to protect its own confidential information, to keep confidential the Confidential Information.
Security. 16.1 If requested to do so by the Buyer, before entering into this Call-Off Contract the Supplier will, within 15 Working Days of the date of this Call-Off Contract, develop (and obtain the Buyer’s written approval of) a Security Management Plan and an Information Security
Security. If the Custodian advances cash or Securities to the Fund for any purpose, either at the Trust's request or as otherwise contemplated in this Agreement, or in the event that the Custodian or its nominee incurs, in connection with its performance under this Agreement, any claim, demand, loss, expense or liability (including reasonable attorneys' fees) (except such as may arise from its or its nominee's bad faith, negligence or willful misconduct), then, in any such event, any property at any time held for the account of the Fund shall be security therefor, and should the Fund fail promptly to repay or indemnify the Custodian, the Custodian shall be entitled to utilize available cash of such Fund and to dispose of other assets of such Fund to the extent necessary to obtain reimbursement or indemnification.
Security. This Agreement is made by each Pledgor for the benefit of the Secured Creditors to secure: (i) the full and prompt payment when due (whether at the stated maturity, by acceleration or otherwise) of all obligations, liabilities and indebtedness (including, without limitation, principal, premium, interest, fees and indemnities (including, without limitation, all interest that accrues after the commencement of any case, proceeding or other action relating to the bankruptcy, insolvency, reorganization or similar proceeding of any Pledgor at the rate provided for in the respective documentation, whether or not a claim for post-petition interest is allowed in any such proceeding)) of such Pledgor to the Lender Creditors (provided, in respect of the Lender Creditors which are Lenders, such aforementioned obligations, liabilities and indebtedness shall arise only for such Lenders (in such capacity) in respect of Loans), whether now existing or hereafter incurred under, arising out of, or in connection with, the Credit Agreement and the other Credit Documents to which such Pledgor is a party (including, in the case of each Pledgor that is a Subsidiary Guarantor, all such obligations, liabilities and indebtedness of such Pledgor under the Subsidiaries Guaranty) and the due performance and compliance by such Pledgor with all of the terms, conditions and agreements contained in the Credit Agreement and in such other Credit Documents (all such obligations, liabilities and indebtedness under this clause (i), except to the extent consisting of obligations, liabilities or indebtedness with respect to Interest Rate Protection Agreements or Other Hedging Agreements, being herein collectively called the “Credit Document Obligations”); (ii) the full and prompt payment when due (whether at the stated maturity, by acceleration or otherwise) of all obligations, liabilities and indebtedness (including, without limitation, all interest that accrues after the commencement of any case, proceeding or other action relating to the bankruptcy, insolvency, reorganization or similar proceeding of any Pledgor at the rate provided for in the respective documentation, whether or not a claim for post-petition interest is allowed in any such proceeding) owing by such Pledgor to the Other Creditors under, or with respect to (including, in the case of each Pledgor that is a Subsidiary Guarantor, all such obligations, liabilities and indebtedness of such Pledgor under the Subsidiaries Guaranty), ...
Security. Each of FIIOC and FSC represents and warrants that, to the best of its knowledge, the various procedures and systems which it has implemented with regard to the safeguarding from loss or damage attributable to fire, theft or any other cause (including provision for twenty–four hours a day restricted access) of the Trust's blank checks, certificates, records and other data and FIIOC’s and FSC's records, data, equipment, facilities and other property used in the performance of its obligations hereunder are adequate, and that it will make such changes therein from time to time as in its judgment are required for the secure performance of its obligations hereunder. FIIOC and FSC shall review such systems and procedures on a periodic basis and the Trust shall have access to review these systems and procedures.
Security. Contractor warrants, covenants and represents that, in the performance of the Contract, Contractor, its agents, Subcontractors, officers, distributors, resellers and employees will comply fully with all security procedures of the Authorized User set forth in the Contract or Purchase Order or otherwise communicated in advance to the Contractor including but not limited to physical, facility, documentary and cyber security rules, procedures and protocols.