Value and Secrecy Sample Clauses

Value and Secrecy. Employee acknowledges and agrees that the Confidential Information has independent actual or potential economic value from not being generally known to the public or to other persons who can obtain economic value from its disclosure or use, is not readily available or independently ascertainable through any source other than Company and its Affiliates, and is subject to reasonable efforts to maintain its secrecy.
AutoNDA by SimpleDocs

Related to Value and Secrecy

  • Privacy and Security Except as set forth in Schedule 3.26:

  • and Section 6 4 of the Warrant Agreement. In the event that the Warrant is a Private Placement Warrant that is to be exercised on a “cashless” basis pursuant to subsection 3.3.1(c) of the Warrant Agreement, the number of shares of Common Stock that this Warrant is exercisable for shall be determined in accordance with subsection 3.3.1(c) of the Warrant Agreement. In the event that the Warrant is to be exercised on a “cashless” basis pursuant to Section 7.4 of the Warrant Agreement, the number of shares of Common Stock that this Warrant is exercisable for shall be determined in accordance with Section 7.4 of the Warrant Agreement. In the event that the Warrant may be exercised, to the extent allowed by the Warrant Agreement, through cashless exercise (i) the number of shares of Common Stock that this Warrant is exercisable for would be determined in accordance with the relevant section of the Warrant Agreement which allows for such cashless exercise and (ii) the holder hereof shall complete the following: The undersigned hereby irrevocably elects to exercise the right, represented by this Warrant Certificate, through the cashless exercise provisions of the Warrant Agreement, to receive shares of Common Stock. If said number of shares is less than all of the shares of Common Stock purchasable hereunder (after giving effect to the cashless exercise), the undersigned requests that a new Warrant Certificate representing the remaining balance of such shares of Common Stock be registered in the name of _____________________, whose address is and that such Warrant Certificate be delivered to _____________________________________, whose address is _____________________________________. [Signature Page Follows] Date: , 2021 (Signature) (Address) (Tax Identification Number) Signature Guaranteed: THE SIGNATURE(S) SHOULD BE GUARANTEED BY AN ELIGIBLE GUARANTOR INSTITUTION (BANKS, STOCKBROKERS, SAVINGS AND LOAN ASSOCIATIONS AND CREDIT UNIONS WITH MEMBERSHIP IN AN APPROVED SIGNATURE GUARANTEE MEDALLION PROGRAM, PURSUANT TO S.E.C. RULE 17Ad-15 (OR ANY SUCCESSOR RULE)). EXHIBIT B LEGEND “THE SECURITIES REPRESENTED BY THIS CERTIFICATE HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED, OR ANY STATE SECURITIES LAWS, AND MAY NOT BE OFFERED, SOLD, TRANSFERRED OR OTHERWISE DISPOSED OF UNLESS REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED, AND ANY APPLICABLE STATE SECURITIES LAWS OR AN EXEMPTION FROM REGISTRATION IS AVAILABLE. IN ADDITION, SUBJECT TO ANY ADDITIONAL LIMITATIONS ON TRANSFER DESCRIBED IN THE LETTER AGREEMENT BY AND AMONG GORES TECHNOLOGY PARTNERS, INC. (THE “COMPANY”), GORES TECHNOLOGY PARTNERS SPONSOR LLC AND THE OTHER PARTIES THERETO, THE SECURITIES REPRESENTED BY THIS CERTIFICATE MAY NOT BE SOLD OR TRANSFERRED PRIOR TO THE DATE THAT IS THIRTY (30) DAYS AFTER THE DATE UPON WHICH THE COMPANY COMPLETES ITS INITIAL BUSINESS COMBINATION (AS DEFINED IN SECTION 3 OF THE WARRANT AGREEMENT REFERRED TO HEREIN) EXCEPT TO A PERMITTED TRANSFEREE (AS DEFINED IN SECTION 2 OF THE WARRANT AGREEMENT) WHO AGREES IN WRITING WITH THE COMPANY TO BE SUBJECT TO SUCH TRANSFER PROVISIONS. SECURITIES EVIDENCED BY THIS CERTIFICATE AND SHARES OF CLASS A COMMON STOCK OF THE COMPANY ISSUED UPON EXERCISE OF SUCH SECURITIES SHALL BE ENTITLED TO REGISTRATION RIGHTS UNDER A REGISTRATION RIGHTS AGREEMENT TO BE EXECUTED BY THE COMPANY.” No. Warrants

  • and Section 7 4. If, by reason of any exercise of Warrants on a “cashless basis”, the holder of any Warrant would be entitled, upon the exercise of such Warrant, to receive a fractional interest in a share of Common Stock, the Company shall round down to the nearest whole number, the number of shares of Common Stock to be issued to such holder.

  • Confidentiality and Security The Service Provider will, and will use reasonable endeavours to ensure that Service Provider Affiliates and Third Party Service Providers will, implement reasonable and appropriate technical and organizational security measures to protect Client Personal Data that is within its or their custody or control against unauthorized or unlawful Processing and accidental destruction or loss.

  • Access and Security Customer will be fully responsible for any charges, costs, expenses (other than those included in the Internet Data Center Services), and third party claims that may result from its use of, or access to, the Internet Data Centers and/or the Customer Area including but not limited to any unauthorized use of any access devices provided by Exodus hereunder. Except with the advanced written consent of Exodus, Customer's access to the Internet Data Centers will be limited solely to the individuals identified and authorized by Customer to have access to the Internet Data Centers and the Customer Area in accordance with this Agreement, as identified in the Customer Registration Form, as amended from time to time, which is hereby incorporated by this reference ("Representatives").

  • Reporting Status and Securities Laws Matters The Company is a “reporting issuer” and not on the list of reporting issuers in default under Securities Laws in each of the Provinces of British Columbia, Alberta and Ontario. No delisting, suspension of trading in or cease trading order with respect to any securities of the Company and, to the knowledge of the Company, no inquiry or investigation (formal or informal) of any Securities Authority, is in effect or ongoing or, to the knowledge of the Company, expected to be implemented or undertaken.

  • Assignments, Successors, and No Third-Party Rights Neither party may assign any of its rights under this Agreement without the prior consent of the other parties, which will not be unreasonably withheld, except that Buyer may assign any of its rights under this Agreement to any Subsidiary of Buyer. Subject to the preceding sentence, this Agreement will apply to, be binding in all respects upon, and inure to the benefit of the successors and permitted assigns of the parties. Nothing expressed or referred to in this Agreement will be construed to give any Person other than the parties to this Agreement any legal or equitable right, remedy, or claim under or with respect to this Agreement or any provision of this Agreement. This Agreement and all of its provisions and conditions are for the sole and exclusive benefit of the parties to this Agreement and their successors and assigns.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Data Privacy and Security Laws The Company and its subsidiaries are, and at all prior times were, in material compliance with all applicable state and federal data privacy and security laws and regulations, including without limitation the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended by the Health Information Technology for Economic and Clinical Health Act (the “HITECH Act”) (collectively, the “Privacy Laws”). To ensure compliance with the Privacy Laws, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). “Personal Data” means (i) a natural person’s name, street address, telephone number, e-mail address, photograph, social security number or tax identification number, driver’s license number, passport number, credit card number, bank information, or customer or account number; (ii) any information which would qualify as “personally identifying information” under the Federal Trade Commission Act, as amended; (iii) Protected Health Information as defined by HIPAA; and (iv) any other piece of information that allows the identification of such natural person, or his or her family, or permits the collection or analysis of any data related to an identified person’s health or sexual orientation. The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and no disclosure made pursuant to any Policy has, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential material liability under or relating to, or actual or potential material violation of, any of the Privacy Laws, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation or other corrective action pursuant to any Privacy Law; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability under any Privacy Law.

  • Valid Transfer and Security Interest This Agreement constitutes a grant of a security interest in all of the Collateral Portfolio to the Trustee, for the benefit of the Secured Parties, which upon the delivery of the Required Loan Documents to the Collateral Custodian, the crediting of Loan Assets to the Controlled Accounts and the filing of the financing statements, shall be a valid and first priority perfected security interest in the Loan Assets forming a part of the Collateral Portfolio and in that portion of the Loan Assets in which a security interest may be perfected by filing subject only to Permitted Liens. Neither the Borrower nor any Person claiming through or under Borrower shall have any claim to or interest in the Controlled Accounts and, if this Agreement constitutes the grant of a security interest in such property, except for the interest of the Borrower in such property as a debtor for purposes of the UCC.

Time is Money Join Law Insider Premium to draft better contracts faster.