Security of Gen Sample Clauses

Security of Gen. For any suitable (W, W′, E), the string R has high entropy ˜ ≥
AutoNDA by SimpleDocs

Related to Security of Gen

  • Security of Data a. Each of the parties shall:

  • RATIFICATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT Borrower hereby ratifies, confirms and reaffirms, all and singular, the terms and conditions of the IP Security Agreement and acknowledges, confirms and agrees that said IP Security Agreement contains an accurate and complete listing of all Intellectual Property Collateral as defined in said IP Security Agreement, which shall remain in full force and effect.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Creation, Perfection and Priority of Security Interests The representations and warranties regarding creation, perfection and priority of security interests in the Purchased Property, which are attached to this Agreement as Appendix B, are true and correct to the extent that they are applicable.

  • Protection of Intellectual Property 1. The Parties shall grant and ensure adequate, effective and non-discriminatory protection of intellectual property rights, and provide for measures for the enforcement of such rights against infringement thereof, counterfeiting and piracy, in accordance with the provisions of this Article, Annex VI and the international agreements referred to therein.

  • ACKNOWLEDGEMENT AND PROTECTION OF INTELLECTUAL PROPERTY RIGHTS 9.1 The Institution acknowledges that all copyrights, patent rights, trade marks, database rights, trade secrets and other intellectual property rights relating to the Licensed Material are the sole and exclusive property of Publisher or are duly licensed to the Publisher and that this Licence does not assign or transfer to the Institution any right, title or interest therein except for the right to use the Licensed Material in accordance with the terms and conditions of this Licence.

  • Definition of Intellectual Property For purposes of this Agreement, the term “Intellectual Property” means all Works, trademarks, trademark applications, patents, patent applications, copyright materials, trade names, trade name applications, industrial designs, and applications to register designs.

  • Creation, Perfection and Priority of Liens The execution and delivery of the Collateral Documents by Loan Parties and Sponsors, together with (i) the actions taken on or prior to the date hereof pursuant to subsections 4.1, 4.2, 6.8 and 6.9 and (ii) the delivery to Administrative Agent of any Pledged Collateral not delivered to Administrative Agent at the time of execution and delivery of the applicable Collateral Document (all of which Pledged Collateral has been so delivered) are effective to create in favor of Administrative Agent for the benefit of Lenders, as security for the respective Secured Obligations (as defined in the applicable Collateral Document in respect of any Collateral), a valid and perfected First Priority Lien on all of the Collateral, and all filings and other actions necessary or desirable to perfect and maintain the perfection and First Priority status of such Liens have been duly made or taken and remain in full force and effect, other than the filing of any UCC financing statements or Mortgages delivered to Administrative Agent for filing or recording, as applicable (but not yet filed or recorded) and the periodic filing of UCC continuation statements in respect of UCC financing statements filed by or on behalf of Administrative Agent.

  • Priority of Security Interest Borrower represents, warrants, and covenants that the security interest granted herein is and shall at all times continue to be a first priority perfected security interest in the Collateral (subject only to Permitted Liens that are permitted pursuant to the terms of this Agreement to have superior priority to Bank’s Lien under this Agreement). If Borrower shall acquire a commercial tort claim, Borrower shall promptly notify Bank in a writing signed by Borrower of the general details thereof and grant to Bank in such writing a security interest therein and in the proceeds thereof, all upon the terms of this Agreement, with such writing to be in form and substance reasonably satisfactory to Bank.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

Time is Money Join Law Insider Premium to draft better contracts faster.