Xxxxx Security Sample Clauses

Xxxxx Security. All emails that include PHI must be sent in an encrypted method using a Covered Entity approved solution as specified in the paragraph (i) of this section.
AutoNDA by SimpleDocs
Xxxxx Security. To the extent that the Obligations are now or hereafter secured by property other than the Intellectual Property or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party's rights and remedies hereunder.
Xxxxx Security. Upon execution of this Sublease, Subtenant shall deliver to Sublandlord an amount equal to $687,355.00 (as may be reduced as set forth herein, the “Security Deposit”). Sublandlord shall retain the Security Deposit as security for the performance by Subtenant of each of its obligations hereunder. If at any time Subtenant fails to perform any of its obligations under this Sublease (beyond any applicable notice and cure period), including the payment of Rent, Sublandlord may, at its option, draw down the Security Deposit (or any portion thereof) to cure Subtenant’s default or to pay for damages caused by Subtenant’s default. In the event of any assignment of this Sublease by the Sublandlord, Sublandlord shall transfer the Security Deposit to the assignee and shall provide Subtenant with evidence of such assignment. Subtenant may provide the Security Deposit to Sublandlord either in the form of cash (via electronic funds transfer) or by letter of credit in a form attached hereto as Schedule D (the “Letter of Credit”). Subtenant shall be responsible for the payment of any fee to the issuing bank for the transfer of the Letter of Credit. Sublandlord shall return the Security Deposit, net of any amounts withheld by Sublandord to satisfy obligations under this Sublease, to Subtenant no later than sixty (60) days following the Term Expiration Date. ​
Xxxxx Security. A. Maintenance of Membership Any employee who is a member of the Union thirty (30) days after the date of this Agreement, or who thereafter becomes a member of the Union shall, as a condition of employment, continue and remain as a member of the Union in good standing for the duration of this Agreement. Good standing shall be defined to mean the obligation to tender all periodic dues and initiation fees uniformly required as a condition of acquiring or retaining membership in the Union. In the event that such a member shall not pay such amount directly to the Union, the Board may cause the termination of employment of such member. The parties expressly recognize that the failure of any member to comply with the .provisions of this Article is just and reasonable cause for discharge from employment.
Xxxxx Security. Use security profiles 2 and enforce encryption for all parts of the PDU to enable several cryptographic primitives, all based upon AES-128, which provides secure functionalities for key derivation, key wrapping/unwrapping and authenticated encryption of packets. Enforce encryption including integrity checking of the packages transferred.
Xxxxx Security 

Related to Xxxxx Security

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Airport Security The Contractor shall be familiar with and conduct its operations in accordance with all regulations and directives of the Authority and the Transportation Security Administration, and any other federal, state or local government having jurisdiction over the airport, with respect to the maintenance of airport security.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

Time is Money Join Law Insider Premium to draft better contracts faster.