Security Documentation Sample Clauses

Security Documentation. BUSINESS ASSOCIATE shall maintain the policies and procedures implemented to comply with section 3.5 in written form (paper or electronic). If an action, activity or assessment is required to be documented, BUSINESS ASSOCIATE shall maintain a written record (paper or electronic) of the action, activity, or assessment, shall retain the documentation for six (6) years from the date of its creation or the date when it last was in effect, whichever is later, make documentation available to those persons responsible for implementing the procedures to which the documentation pertains, and review documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of the PHI.
AutoNDA by SimpleDocs
Security Documentation. The Security Documentation duly executed by Borrower or other applicable party thereto, consisting of the following:
Security Documentation. If the Designated Picture is being produced by a Credit Party, the Administrative Agent shall have received all appropriate security documentation and proof of filings, required by it, in connection with the creation of a first perfected lien in favor of the Administrative Agent for the benefit of the Administrative Agent, the Canadian Agent, the Issuing Bank and the Lenders.
Security Documentation. Subject to the Agreed Security Principles, each security agreement referred to will be substantially the same as that in place immediately prior to the Issue Date (with such modifications as required, but only to the extent necessary, to reflect any change in law since the date of the relevant security agreement). Exhibit A-1 [FORM OF FACE OF DOLLAR NOTE] ARDAGH PACKAGING FINANCE PLC ARDAGH HOLDINGS USA INC. If Regulation S Dollar Global NoteCUSIP Number [•]/ISIN [•] If Restricted Dollar Global Note — CUSIP Number [•]/ISIN [•] No. [ ] [Include if Global Note — UNLESS THIS CERTIFICATE IS PRESENTED BY AN AUTHORIZED REPRESENTATIVE OF THE DEPOSITORY TRUST COMPANY, A NEW YORK CORPORATION (“DTC”), TO THE ISSUERS OR THEIR AGENT FOR REGISTRATION OF TRANSFER, EXCHANGE OR PAYMENT, AND ANY CERTIFICATE ISSUED IS REGISTERED IN THE NAME OF CEDE & CO. OR IN SUCH OTHER NAME AS IS REQUESTED BY AN AUTHORIZED REPRESENTATIVE OF DTC (AND ANY PAYMENT IS MADE TO CEDE & CO. OR TO SUCH OTHER ENTITY AS IS REQUESTED BY AN AUTHORIZED REPRESENTATIVE OF DTC), ANY TRANSFER, PLEDGE OR OTHER USE HEREOF FOR VALUE OR OTHERWISE BY OR TO ANY PERSON IS WRONGFUL INASMUCH AS THE REGISTERED OWNER HEREOF, CEDE & CO., HAS AN INTEREST HEREIN. THIS NOTE IS A GLOBAL NOTE WITHIN THE MEANING OF THE INDENTURE AND IS REGISTERED IN THE NAME OF DTC OR A NOMINEE OF DTC OR A SUCCESSOR DEPOSITARY. THIS NOTE IS NOT EXCHANGEABLE FOR SECURITIES REGISTERED IN THE NAME OF A PERSON OTHER THAN DTC OR ITS NOMINEE EXCEPT IN THE LIMITED CIRCUMSTANCES DESCRIBED IN THE INDENTURE, AND NO TRANSFER OF THIS NOTE (OTHER THAN A TRANSFER OF THIS NOTE AS A WHOLE BY DTC TO A NOMINEE OF DTC OR BY A NOMINEE OF DTC TO DTC OR ANOTHER NOMINEE OF DTC OR BY DTC OR ANY SUCH NOMINEE TO A SUCCESSOR DEPOSITARY OR A NOMINEE OF SUCH SUCCESSOR DEPOSITARY) MAY BE REGISTERED EXCEPT IN THE LIMITED CIRCUMSTANCES DESCRIBED IN THE INDENTURE.] THIS NOTE HAS NOT BEEN AND WILL NOT BE REGISTERED UNDER THE U.S. SECURITIES ACT OF 1933, AS AMENDED (THE “U.S. SECURITIES ACT”) OR THE SECURITIES LAWS OF ANY STATE OR OTHER JURISDICTION. NEITHER THIS NOTE NOR ANY INTEREST OR PARTICIPATION HEREIN MAY BE OFFERED, SOLD, ASSIGNED, TRANSFERRED, PLEDGED, ENCUMBERED OR OTHERWISE DISPOSED OF IN THE ABSENCE OF SUCH REGISTRATION OR UNLESS SUCH TRANSACTION IS EXEMPT FROM, OR NOT SUBJECT TO, THE REGISTRATION REQUIREMENTS OF THE U.S. SECURITIES ACT. THE HOLDER OF THIS NOTE BY ITS ACCEPTANCE HEREOF (1) REPRESENTS THAT (A) IT IS A “QUALIFIED INSTITUTIONAL BUYER” (AS DEFINED...
Security Documentation. The Purchaser shall deliver at the first Facility/ Design Closing the Security Documentation in customary form acceptable to the Seller and the Purchaser and containing such provisions as are necessary or appropriate to provide the Seller with a first priority (subject to permitted encumbrances) fully perfected security interest in the shares of French Newco, the Equipment and the Inventory (collectively, the "SECURED ASSETS"). If and to the extent the Purchaser causes a Designated Purchaser (other than the Purchaser) to purchase all or a portion of the Secured Assets, then the Purchaser shall cause such Designated Purchaser, on or prior to the Closing in respect of the relevant Secured Assets, to agree to be bound by this Agreement in respect of such Secured Assets as if it were the Purchaser under this Agreement, but without prejudice to the liabilities of the Purchaser hereunder, or enter into with the Seller or applicable Designated Seller of the relevant Secured Assets an asset purchase agreement in substantially the form of this agreement and the Purchaser shall guarantee, and cause such Designated Purchaser to perform, all of the obligations of such Designated Purchaser under this Agreement, any other asset purchase agreement executed and delivered pursuant hereto and any other agreement or instrument delivered pursuant to this Agreement or any such other asset purchase agreement. The Purchaser or applicable Designated Purchaser shall also be permitted after the first Facility/ Design Closing to have an Affiliate of the Purchaser purchase all or a portion of the Secured Assets provided the same procedure in relation to the sale of the Secured Assets from the Purchaser to the Designated Purchaser (other than the Purchaser) is followed, mutatis mutandis.
Security Documentation. 1. If the relevant Additional Obligor is incorporated in England and Wales, Northern Ireland or Scotland a Debenture and, if relevant, Standard Securities and Northern Irish supplemental mortgages, executed by the proposed Additional Obligor.
Security Documentation. IHS systems have been certified and accredited and have appropriate supporting documents, including Risk Assessment Reports and System Security Plans. • Members may purchase commercial off-the-shelf (COTS) software and/or rely on custom software development for programming purposes. In such cases, Members must rely upon security documentation, certification and 20 accreditation, if any, of such commercial vendors, consultants, or internal staff. • Describes IHS’s role as a business associate
AutoNDA by SimpleDocs
Security Documentation. To facilitate Client’s risk-based assessment of Xxxxxx’x information security program and administrative, technical, and physical safeguards applicable to Client’s Confidential Information, Smarsh will make its Security Packet available to Client via xxxxx://xxxxxxx.xxxxxx.xxx xxxxx://xxxxxxx.xxxxxx.xxx/s/. The Security Packet includes, among other documentation, Xxxxxx’x completed industry-standard information gathering questionnaire (“SIG”) and Xxxxxx’x annual independent SSAE 16 SOC 2 Type II report. If Client requests that Smarsh complete Client’s security or other questionnaire(s) in lieu of, or in addition to, the Security Packet, Client must execute an order form and pay a professional services fee based on the size and scope of such questionnaire(s).
Security Documentation. Both parties shall:  Ensure that security is planned for, documented, and integrated into the System Life Cycle from the IT system’s initiation to the system’s disposal. For applicable guidance, please refer to CMS eXpedited Life Cycle12 and the CMS Risk Management Handbook.13 CMS shall:  Review the CMS System Security and Privacy Plan (SSP) for CMS information systems and the CMS network annually and update it when a major modification occurs, as required by the CMS SSP Procedures. The Non-CMS Organization shall:  Maintain an SSP based on the Enhanced Direct Enrollment (EDE) System Security and Privacy Plan (SSP) document14 on the Non-CMS Organization’s network and update annually or whenever there is a significant change;15 and 11 Located at: xxxxx://xxx.xxx.xxx/about/agencies/asa/ocio/cybersecurity/rules-of-behavior-for-use-of-hhs- information-resources/index.html. 12 Located at: xxxx://xxx.xxx.xxx/Research-Statistics-Data-and-Systems/CMS-Information- Technology/XLC/index.html. 13 Located at: xxxx://xxx.xxx.xxx/Research-Statistics-Data-and-Systems/CMS-Information- Technology/InformationSecurity/Information-Security-Library.html.
Security Documentation. Such other documents, instruments and agreements and other actions as the Administrative Agent shall require in its sole discretion to fully create, evidence, register and perfect the Administrative Agent’s Liens in the Collateral securing the Lender Indebtedness.
Time is Money Join Law Insider Premium to draft better contracts faster.