SECURITY AND APPLICATION Sample Clauses

SECURITY AND APPLICATION. 16.1 The Borrower hereby undertakes with the Lender to execute, deliver and perform the provisions of, and procure the execution, delivery and performance by the other parties thereto (other than the Lender) of, the Security Documents and the provisions thereof at the times and in the manner provided in this Agreement and in the Security Documents so that all such documents shall both at the date of such execution and delivery and at all times during the Security Period be valid and binding obligations of the Borrower and such other parties enforceable in accordance with their respective terms.
AutoNDA by SimpleDocs
SECURITY AND APPLICATION. 7.1 It is declared and agreed that (i) the security created or to be created by or pursuant to this Agreement shall be held by the Lender as a continuing security for the payment of all moneys which may at any time and from time to time be or become due and payable to the Lender under this Agreement, (ii) the security so created shall not be satisfied by any intermediate payment or satisfaction of any part of the amount hereby and thereby secured, (iii) the security so created shall be in addition to and shall not in any way be prejudiced or affected by any collateral or other security now or hereafter held by the Lender for all or any part of the moneys hereby and thereby secured, (iv) every power and remedy given to the Lender hereunder shall be in addition to, and not a limitation of, any and every other power or remedy vested in the Lender hereunder or thereunder and (v) all the powers so vested in the Lender may be exercised from time to time and as often as the Lender may deem expedient.
SECURITY AND APPLICATION. 32 17 COMMUNICATIONS......................................................33 18 ASSIGNMENTS.........................................................34 19 MISCELLANEOUS.......................................................35
SECURITY AND APPLICATION. 16.1 The Borrower hereby undertakes with the Lender to execute, deliver and perform the provisions of, and procure the execution, delivery and performance by the other parties thereto (other than the Lender) of, the Security Documents and the provisions thereof at the times and in the manner provided in this Agreement and in the Security Documents so that all such documents shall both at the date of such execution and delivery and at all times during the Security Period be valid and binding obligations of the Borrower and such other parties enforceable in accordance with their respective terms; without prejudice to the foregoing the Borrower hereby further undertakes that the Borrower will at any time during the Security Period and on the first written request of the Lender, procure that a pledge over all the issued shares in the Borrower in favour of the Lender and in such form as the Lender shall approve or require be executed and delivered to the Lender as additional security for the obligations of the Borrower under this Agreement together with all proxies, directors' letters of resignations and share stock certificates as are required by such pledge.

Related to SECURITY AND APPLICATION

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Security and Charge 14.1 In consideration of the Contractor agreeing to supply the Materials, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money).

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Job Postings and Applications If a vacancy or a new job is created for which Union personnel reasonably might be expected to be recruited, the following shall apply:

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Scope and Application This Appendix will apply to all work undertaken within the Employer’s Workshop(s) by employees mainly engaged at the Workshop.

  • Authority and Validity 27 5.3 No Breach or Violation.................................... 28 5.4 Litigation................................................ 29 5.5

Time is Money Join Law Insider Premium to draft better contracts faster.