Security Laws Sample Clauses

Security Laws. Buyer is acquiring the Properties for its (and its affiliates) own account and not with the intent to make a distribution within the meaning of the Securities Act of 1933 (as amended, and together the rules and regulations pertaining thereto, the “Securities Act”) or a distribution thereof in violation of any other applicable securities Laws.
AutoNDA by SimpleDocs
Security Laws. The obligations hereunder are subject to the granting of appropriate permits, consents and/or orders of the Commissioner of Corporations of California, if any such permits, consents or orders are then required. All parties hereto and their heirs, personal representatives and assigns shall cooperate in the execution of all documents necessary, and the taking of any corporate actions necessary to obtain any such permit, consent and/or order. Trade Secrets . The Transferor, Terminated or Disabled Shareholder, as the case may be, agrees not to directly or indirectly divulge, communicate, use to the detriment of Corporation or for the benefit of any other person or persons, or misuse in any way, any confidential information or trade secrets of the Corporation, including personal information, forms, know how, customer lists or other technical data. The Shareholders acknowledge that the remedy at law may be inadequate to remedy a breach or intended breach of this Section and, therefore, consent to temporary or permanent injunctive relief to prevent such breach. Gender . As used in this Agreement, the masculine, feminine or neuter gender, and the singular or plural number, shall be deemed to include the others whenever the context so requires. Executed this ____ day of _____________, at ______________, ___________ County, California. CORPORATION: By: Its: SHAREHOLDERS:
Security Laws. The obligations hereunder are subject to the granting of appropriate permits, consents and/or orders of the Commissioner of Corporations of California, if any such permits, consents or orders are then required. All parties hereto and their heirs, personal representatives and assigns shall cooperate in the execution of all documents necessary, and the taking of any corporate actions necessary to obtain any such permit, consent and/or order.
Security Laws. Each party represents and warrants that it will to the best of its knowledge comply with all applicable securities and other laws, rules and regulations relating hereto.
Security Laws. Nothing in this Plan or in any Award or Award Agreement shall require the Company to issue any Shares with respect to any Award if, in the opinion of counsel for the Company, that issuance could constitute a violation of the Securities Act, any other law or the rules of any applicable securities exchange or securities association then in effect. As a condition to the grant or exercise of an Award, the Company may require the Participant (or, in the event of the Participant's death, the Participant's legal representatives, heirs, legatees or distributees) to provide written representations concerning the Participant's (or such other person's) intentions with regard to the retention or disposition of the Shares covered by the Award and written covenants as to the manner of disposal of such Shares as may be necessary or useful to ensure that the grant, exercise or disposition will not violate the Securities Act, and other law or any rule of any applicable securities exchange or securities association then in effect. The Company shall not be required to register any Shares under the Securities Act or register or qualify any Shares under any state or other securities laws.
Security Laws. The Option shall not be exercisable if and to the extent the Company determines that such exercise would violate applicable state or Federal securities laws or the rules and regulations of any securities exchange or market on which the Stock is traded. If the Company makes such a determination, it shall use all reasonable efforts to obtain compliance with such laws, rules and regulations. In making any determination hereunder, the Company may rely on the opinion of counsel for the Company. If, by reason of the foregoing restrictions, the Option is not exercisable, the Company shall settle the Award by a payment of cash equal to the product of the applicable number of Covered Shares multiplied by the excess of the market value per share of the Stock over the Exercise Price.
Security Laws. (a) Prior to the Closing, the Company shall not take any action that would cause the number of Company Stockholders who are not "accredited investors" pursuant to Regulation D promulgated under the Securities Act to increase to more than 35 during the term of this Agreement or that would cause any Person who does not meet the standards of Regulation D required for "purchasers" under Regulation D to become a stockholder.
AutoNDA by SimpleDocs
Security Laws. Grantee agrees to comply with all applicable securities laws upon sales or disposition of shares acquired hereunder.
Security Laws. EPC is acquiring the NPR Properties for its own account and not with the intent to make a distribution within the meaning of the Securities Act of 1933 (and the rules and regulations pertaining thereto) or a distribution thereof in violation of any other applicable securities Laws. (g)

Related to Security Laws

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security Agreement under Uniform Commercial Code (a) It is the intention of the parties hereto that this Mortgage shall constitute a Security Agreement within the meaning of the Uniform Commercial Code (the “Code”) of the State in which the Mortgaged Property is located. If an Event of Default shall occur and be continuing under this Mortgage, then in addition to having any other right or remedy available at law or in equity, Mortgagee shall have the option of either (i) proceeding under the Code and exercising such rights and remedies as may be provided to a secured party by the Code with respect to all or any portion of the Mortgaged Property which is personal property (including, without limitation, taking possession of and selling such property) or (ii) treating such property as real property and proceeding with respect to both the real and personal property constituting the Mortgaged Property in accordance with Mortgagee’s rights, powers and remedies with respect to the real property (in which event the default provisions of the Code shall not apply). If Mortgagee shall elect to proceed under the Code, then ten days’ notice of sale of the personal property shall be deemed reasonable notice and the reasonable expenses of retaking, holding, preparing for sale, selling and the like incurred by Mortgagee shall include, but not be limited to, reasonable attorneys’ fees and legal expenses. At Mortgagee’s request, Mortgagor shall assemble the personal property and make it available to Mortgagee at a place designated by Mortgagee which is reasonably convenient to both parties.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Uniform Commercial Code Security Agreement This Deed of Trust is intended to be a security agreement pursuant to the Uniform Commercial Code, as in effect in the State of Washington, as amended or recodified from time to time (the “Uniform Commercial Code”) for any of the items specified above as part of the Collateral which, under applicable law, may be subject to a security interest pursuant to the Uniform Commercial Code, and Trustor hereby grants Beneficiary a security interest in said items. Trustor agrees that Beneficiary may file this Deed of Trust, or a reproduction thereof, in the real estate records or other appropriate index, as a financing statement for any of the items specified above as part of the Collateral. Any reproduction of this Deed of Trust or of any other security agreement or financing statement shall be sufficient as a financing statement. In addition, Trustor agrees to execute and deliver to Beneficiary, upon Beneficiary’s request, any financing statements, as well as extensions, renewals and amendments thereof, and reproductions of this Deed of Trust in such form as Beneficiary may reasonably require to perfect a security interest with respect to said items. Trustor shall pay all costs of filing such financing statements and any extensions, renewals, amendments and releases thereof, and shall pay all reasonable costs and expenses of any record searches for financing statements Beneficiary may reasonably require. Without the prior written consent of Beneficiary, except as expressly provided in the Credit Agreement, Trustor shall not create or suffer to be created pursuant to the Uniform Commercial Code any other security interest in said items, including replacements and additions thereto. Upon a Default, Beneficiary shall have the remedies of a secured party under the Uniform Commercial Code and, at Beneficiary’s option, may also invoke the remedies provided herein or in any of and subject to the terms of the Loan Documents, or pursuant to any applicable law as to such items. In exercising any of said remedies, Beneficiary may proceed against the items of real property and any items of personal property specified above as part of the Collateral separately or together and in any order whatsoever, without in any way affecting the availability of Beneficiary’s remedies under the Uniform Commercial Code or of the remedies provided herein or in any of the Loan Documents. This Deed of Trust constitutes a fixture filing in accordance with the Washington Uniform Commercial Code (RCW 62A.9A-102(40)) as to all or any part of the Collateral which now or hereafter constitutes "Fixtures" under RCW 62A.9A-102(41).

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

Time is Money Join Law Insider Premium to draft better contracts faster.