Security Provider Sample Clauses

Security Provider. The Security Provider may not assign, delegate or transfer any of its rights or obligations under this Agreement without the consent of the Lenders, and any purported assignment, delegation or transfer in violation of this provision shall be void and of no effect.
AutoNDA by SimpleDocs
Security Provider. (c) A copy of a resolution of the board of directors of each Conditions Subsequent (Phase 3) Obligor and Conditions Subsequent (Phase 3) Security Provider:
Security Provider. The Security Provider may not assign or transfer any of its rights or obligations under this Agreement.
Security Provider. (a) It is a corporation or limited liability company, duly incorporated or formed and validly existing in good standing under the laws of its jurisdiction of incorporation or formation, as the case may be, as set forth on Schedule 1.
Security Provider. 若第三人為擔保客戶之債務而向本行提供擔保品時,客戶授權本行向該第三擔保品提供人提供本約定書、相關合約及文件、客戶最近期對帳單(若經第三擔保品提供人要求時)及本行於本約定書之服務下就客戶逾期未清償款項所給予客戶之任何正式請求之副本。 If a third party provides Securities to the Bank in order to secure the Client’s liabilities, the Client hereby authorizes the Bank to provide the third party Security Provider with this Agreement, relevant agreements and instruments, the latest Bank statement (upon the request by the third Security Provider), and duplicates of any formal requests the Bank made to the Client regarding the Client’s overdue amount for the service provided by the Bank under the Agreement. 第九章 違約情事

Related to Security Provider

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Obligors (a) A copy of the constitutional documents of each Obligor.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!