Security issue Category Sample Clauses

Security issue Category. “Critical” – uncovered vulnerability of the System may be used immediately to compromise the System (gaining access to unprivileged folders, gaining access to the domain/local administrator account, gaining access to other user accounts, potential permanent putting the System out of service, etc.).
AutoNDA by SimpleDocs

Related to Security issue Category

  • Security Interest This Agreement creates a valid and continuing security interest (as defined in the UCC) in the Receivables in favor of the Issuer, which security interest is prior to all other Liens, and is enforceable as such against creditors of and purchasers from the Seller.

  • Collateral The Collateral for this Note includes the Funding Agreement and the Guarantee specified on the face hereof.

  • What If I Pledge My Account? If you use (pledge) all or part of your Traditional IRA as security for a loan, then the portion so pledged will be treated as if distributed to you and will be taxable to you as ordinary income during the year in which you make such pledge. The 10% penalty tax on early distributions may also apply in addition to ordinary income taxes.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.

  • Security Interests No party to this Escrow Agreement shall grant a security interest in any monies or other property deposited with the Escrow Agent under this Escrow Agreement, or otherwise create a lien, encumbrance or other claim against such monies or borrow against the same.

  • Priority If the Managing Underwriter or Underwriters of any proposed Underwritten Offering of Common Units included in an Underwritten Offering involving Included Registrable Securities advises the Partnership that the total amount of Common Units that the Selling Holders and any other Persons intend to include in such offering exceeds the number that can be sold in such offering without being likely to have an adverse effect on the price, timing or distribution of the Common Units offered or the market for the Common Units, then the Common Units to be included in such Underwritten Offering shall include the number of Registrable Securities that such Managing Underwriter or Underwriters advises the Partnership can be sold without having such adverse effect, with such number to be allocated (i) first, to the Partnership and (ii) second, pro rata among the Selling Holders who have requested participation in such Underwritten Offering and any other holder of securities of the Partnership having rights of registration that are neither expressly senior nor subordinated to the Registrable Securities (the “Parity Securities”). The pro rata allocations for each Selling Holder who has requested participation in such Underwritten Offering shall be the product of (a) the aggregate number of Registrable Securities proposed to be sold in such Underwritten Offering multiplied by (b) the fraction derived by dividing (x) the number of Registrable Securities owned on the Closing Date by such Selling Holder by (y) the aggregate number of Registrable Securities owned on the Closing Date by all Selling Holders plus the aggregate number of Parity Securities owned on the Closing Date by all holders of Parity Securities that are participating in the Underwritten Offering.

  • Security Assessments Upon advance written notice by the JBE, Contractor agrees that the JBE shall have reasonable access to Contractor’s operational documentation, records, logs, and databases that relate to data security and the Contractor’s Information Security Program. Upon the JBE’s request, Contractor shall, at its expense, perform, or cause to have performed an assessment of Contractor’s compliance with its privacy and data security obligations. Contractor shall provide to the JBE the results, including any findings and recommendations made by Contractor’s assessors, of such assessment, and, at its expense, take any corrective actions.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

Time is Money Join Law Insider Premium to draft better contracts faster.