Security of Funds Sample Clauses

Security of Funds. 12.1 Upon signing an EMPLOYER to this Collective Bargaining Agreement, the EMPLOYER must submit to the Union a complete list of all EMPLOYEES and jobs; also, proof of having proper Worker’s Compensation and Unemployment Insurance.
AutoNDA by SimpleDocs
Security of Funds. Any cash balance in the Funds shall be continuously secured in the manner required by the applicable laws of the State of Texas as such laws now exist or may exist during the term of this Contract.
Security of Funds. The funds to be deposited by the District with the Authority and the funds to be set aside by the Authority pursuant to Section 3.1 of this Amended and Restated Agreement shall be kept separate and apart from all other accounts and funds of the Authority and from each other. Subject to the other specific requirements of this Amended and Restated Agreement with respect to the deposit of funds, said funds shall be continuously secured in the manner required by the laws of the State of Texas applicable to the Authority as such laws now exist or may exist during the term of this Amended and Restated Agreement.
Security of Funds. The Company a member of the InvestorsCompensation Fund (ICF), complying with section 58 of the Law 87(I)/2017. The scope of the ICF is to secure the claims of covered Customers against the members of the Fund. Covered Customers can claim compensation up to EUR 20,000 (Twenty Thousand Euros), in the event that, the Company fails to meet its obligations, in the course of providing investment and ancillary services and when the Company’s financial condition is not expected to improve, in the near future. For more information, the Customer may visit the CySEC website (Legal Framework /Regulations under Sections 53(3), 56(3), 58(2) and 72 of the Investment firms Laws), (Consolidating Regulations). In addition to the above, Customer’s funds are kept at a segregated account, with a credit institution within the European Union. The services that cardholders get are stated in the Client agreement. Tradestone Limited provides these services, owns, and operates the xxx.xx website.
Security of Funds. Subject to the other specific requirements of this Agreement with respect to the deposit of funds, any cash balances in the Joint Construction Account shall be continuously secured in the manner required by the laws of the State of Texas applicable to the Authority as such laws now exist or may exist during the term of this Agreement.
Security of Funds. Your money is not protected against unauthorized transactions until you register this card. Funds FDIC-insured upon registration. Your funds will not expire due to inactivity.
Security of Funds. 11.1 Relevant Funds are held in designated bank accounts and you agree to these funds being pooled with money of our other Clients.
AutoNDA by SimpleDocs

Related to Security of Funds

  • Security of Data a. Each of the parties shall:

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Maturity of Receivables Each Receivable shall have an original maturity of not less than 24 months nor greater than 72 months and, as of the Cutoff Date, a remaining maturity of not less than 6 months nor greater than 69 months.

  • Creation, Perfection and Priority of Security Interests The representations and warranties regarding creation, perfection and priority of security interests in the Purchased Property, which are attached to this Agreement as Appendix B, are true and correct to the extent that they are applicable.

  • Priority of Notes Note A-1 and Note A-2 shall be of equal priority, and no portion of any of Note A-1 or Note A-2 shall have priority or preference over any portion of the other Note or security therefor. Except for the Excluded Amounts, all amounts tendered by the Borrower or otherwise available for payment on the Mortgage Loan, whether received in the form of Monthly Payments, a balloon payment, Liquidation Proceeds, proceeds under any guaranty, letter of credit or other instrument serving as security on the Mortgage Loan, proceeds under title, hazard or other insurance policies or awards or settlements in respect of condemnation proceedings or similar exercise of the power of eminent domain shall be distributed by the Master Servicer and applied to Note A-1 and Note A-2 on a Pro Rata and Pari Passu Basis. The Servicing Agreement may provide for the application of Penalty Charges paid in respect of the Mortgage Loan to be used to (i) pay the Master Servicer, the Trustee or the Special Servicer for interest accrued on any Property Advances, (ii) to pay the parties to any Securitization for interest accrued on any P&I Advance, (iii) to pay certain other expenses incurred with respect to the Mortgage Loan and (iv) to pay to the Master Servicer and/or the Special Servicer as additional servicing compensation, except that, for so long as Note A-2 is not included in a Securitization, any Penalty Charges allocated to Note A-2 that are not applied pursuant to clauses (i)-(iii) above shall be remitted to the respective Holder and shall not be paid to the Master Servicer and/or the Special Servicer without the express consent of such Holder.

  • Priority of Provisions If there is a conflict or inconsistency between any term, statement, requirement, or provision of any exhibit attached hereto, any document or events referred to herein, or any document incorporated into this Agreement by reference and a term, statement, requirement, or provision of Articles 1 through 8 of this Agreement, the term, statement, requirement, or provision contained in Articles 1 through 8 shall prevail and be given effect.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Perfection and Protection of Security Interest Borrower shall, at its expense, take all actions requested by FINOVA at any time to perfect, maintain, protect and enforce FINOVA's first priority security interest and other rights in the Collateral and the priority thereof from time to time, including, without limitation, (i) executing and filing financing or continuation statements and amendments thereof and executing and delivering such documents and titles in connection with motor vehicles as FINOVA shall require, all in form and substance satisfactory to FINOVA, (ii) maintaining a perpetual inventory and complete and accurate stock records, (iii) delivering to FINOVA warehouse receipts covering any portion of the Collateral located in warehouses and for which warehouse receipts are issued, and transferring Inventory to warehouses designated by FINOVA, (iv) placing notations on Borrower's books of account to disclose FINOVA's security interest therein and (v) delivering to FINOVA all letters of credit on which Borrower is named beneficiary. FINOVA may file, without Borrower's signature, one or more financing statements disclosing FINOVA's security interest under this Agreement. Borrower agrees that a carbon, photographic, photostatic or other reproduction of this Agreement or of a financing statement is sufficient as a financing statement. If any Collateral is at any time in the possession or control of any warehouseman, bailee or any of Borrower's agents or processors, Borrower shall notify such Person of FINOVA's security interest in such Collateral and, upon FINOVA's request, instruct them to hold all such Collateral for FINOVA's account subject to FINOVA's instructions. From time to time, Borrower shall, upon FINOVA's request, execute and deliver confirmatory written instruments pledging the Collateral to FINOVA, but Borrower's failure to do so shall not affect or limit FINOVA's security interest or other rights in and to the Collateral. Until the Obligations have been fully satisfied and FINOVA's obligation to make further advances hereunder has terminated, FINOVA's security interest in the Collateral shall continue in full force and effect.

  • Security of Information Unless otherwise specifically authorized by the DOH Chief Information Security Officer, Contractor receiving confidential information under this contract assures that: • Encryption is selected and applied using industry standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program against all information stored locally and off-site. Information must be encrypted both in-transit and at rest and applied in such a way that it renders data unusable to anyone but authorized personnel, and the confidential process, encryption key or other means to decipher the information is protected from unauthorized access. • It is compliant with the applicable provisions of the Washington State Office of the Chief Information Officer (OCIO) policy 141, Securing Information Technology Assets, available at: xxxxx://xxxx.xx.xxx/policy/securing-information-technology-assets. • It will provide DOH copies of its IT security policies, practices and procedures upon the request of the DOH Chief Information Security Officer. • DOH may at any time conduct an audit of the Contractor’s security practices and/or infrastructure to assure compliance with the security requirements of this contract. • It has implemented physical, electronic and administrative safeguards that are consistent with OCIO security standard 141.10 and ISB IT guidelines to prevent unauthorized access, use, modification or disclosure of DOH Confidential Information in any form. This includes, but is not limited to, restricting access to specifically authorized individuals and services through the use of: o Documented access authorization and change control procedures; o Card key systems that restrict, monitor and log access; o Locked racks for the storage of servers that contain Confidential Information or use AES encryption (key lengths of 256 bits or greater) to protect confidential data at rest, standard algorithms validated by the National Institute of Standards and Technology (NIST) Cryptographic Algorithm Validation Program (CMVP); o Documented patch management practices that assure all network systems are running critical security updates within 6 days of release when the exploit is in the wild, and within 30 days of release for all others; o Documented anti-virus strategies that assure all systems are running the most current anti-virus signatures within 1 day of release; o Complex passwords that are systematically enforced and password expiration not to exceed 120 days, dependent user authentication types as defined in OCIO security standards; o Strong multi-factor authentication mechanisms that assure the identity of individuals who access Confidential Information; o Account lock-out after 5 failed authentication attempts for a minimum of 15 minutes, or for Confidential Information, until administrator reset; o AES encryption (using key lengths 128 bits or greater) session for all data transmissions, standard algorithms validated by NIST CMVP; o Firewall rules and network address translation that isolate database servers from web servers and public networks; o Regular review of firewall rules and configurations to assure compliance with authorization and change control procedures; o Log management and intrusion detection/prevention systems; o A documented and tested incident response plan Any breach of this clause may result in termination of the contract and the demand for return of all personal information.

  • Priority of Agreement In the event of any conflict between provisions of this Agreement or any amendment hereto and any documents executed, acknowledged, sworn to, or filed by any Manager under this power of attorney, this Agreement and its amendments shall govern.

Time is Money Join Law Insider Premium to draft better contracts faster.