Access and Security definition

Access and Security. Agreement shall mean the Access and Security Agreement dated as of January 1, 2001, between Harvard and Pottstown, on the one hand, and General Motors Corporation, on the other hand, and each of the three Access and Security Agreements dated as of the same date between Harvard and ▇▇▇▇▇-Albion, on the one hand, and General Motors Corporation, on the other hand, relating to the ▇▇▇▇▇-Albion facility in Jackson, Michigan, the Trim-Trend facility in Bryan, Ohio, and the Trim-Trend facility in Spencerville, Ohio.
Access and Security. Agreement shall mean the Access and Security Agreement dated as of January 1, 2001, between Harvard and Pottstown, on the one hand, and General Motors Corporation, on the other hand, each of the three Access and Security Agreements dated as of the same date between Harvard and ▇▇▇▇▇-Albion, on the one hand, and General Motors Corporation, on the other hand, relating to the ▇▇▇▇▇-Albion facility in Jackson, Michigan, the Trim-Trends facility in Bryan, Ohio, and the Trim-Trends facility in Spencerville, Ohio, and the Access and Security Agreement referred to in the Visteon/American Axle Participating Customer Agreement and each other access and security or similar agreement with other Participating Customers of any Borrower facility entered into with the prior written consent of the Lenders and the Junior Lien Lender in connection with a Participating Customer Agreement with such customer.
Access and Security above, as well as the requirements relating to security, traffic and parking in the public domain premises of SNCF RÉSEAU, described in the Special Conditions, shall be the liability of the BENEFICIARY who consequently waives all recourse against SNCF RÉSEAU, its respective agents and its possible insurers. He undertakes to indemnify them and to guarantee them against any action that may be brought against them.

Examples of Access and Security in a sentence

  • Access and Security The VaccineFinder provider portal is being developed and maintained by Boston Children’s Hospital HealthMap in partnership with CDC and Castlight.

  • As provided in Section 2.m above (Access and Security) you authorize us to act on transaction instructions initiated under the access credentials of an authenticated Subuser, just as if it was initiated under your credentials.

  • Access and Security The DCH is owned by HHS and hosted within an Oracle Cloud Infrastructure (OCI) U.S. Government Cloud tenancy.

  • Options include: • Cross-jurisdictional data exchange and queries • Multijurisdictional providers sharing data with multiple IISs via a central connection • Routing of VAMS data to the appropriate IIS • IISs reporting to the DCH Access and Security The IZ Gateway system is owned by CDC and hosted on the APHL Informatics Messaging System (AIMS).

  • Data Sharing Access and Security The VAMS system is owned by CDC and hosted on Salesforce and AWS FedRAMP Moderate Hosting environments, which have undergone GSA evaluation and accreditation through a third-party assessment organization (3PAO).

  • Access and Security Overview The IZ Gateway is a cloud-based message routing service intended to enable data exchange between IISs, other provider systems, and the IZ Data Lake.

  • Such Party is duly formed, validly existing, and in good standing under the laws of its state of organization, and has the requisite power and authority to execute, deliver, and perform its obligations under this Agreement, the Warrant Agreement, and the Access and Security Agreement (collectively, the “Related Agreements”) and to consummate the transactions contemplated by this Agreement and the Related Agreements.

  • AAM and GM shall enter into an Access and Security Agreement in the form of the attached Exhibit 1.6 (the “Access and Security Agreement”) on or prior to the date on which AAM invokes the expedited payment terms provided in Section 1.5(g) of this Agreement and, in any event, on or before the Effective Date.

  • While not a party to the Omnibus Access and Security Agreement (“Access Agreement”) made among the customers listed on Attachment 1 (the “Consenting OEMs”) and Takata Corporation (for itself and on behalf of its direct and indirect subsidiaries, collectively, the “Supplier”), dated as of , 2017, (“Lender”) and Supplier are parties to various loan and/or security agreements and Lender has security interests in Supplier’s assets.

  • With the exception of TIMET’s obligations under Section 4(b)(ii) of the Access and Security Agreement, in no event shall TIMET be liable for damage to, or loss of, ▇▇▇▇▇▇’ property, equipment or tools or that of ▇▇▇▇▇▇’ employees or sub-contractors regardless of the actual or alleged negligence of TIMET.

Related to Access and Security

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Privacy and Security Laws means applicable Laws that govern the Processing, privacy or security of Personal Information.

  • Loan and Security Agreement “thereunder”, “thereof” or similar words referring to the Loan Agreement shall mean and be a reference to this Agreement and (b) each reference in the Financing Agreements to a “Note” or “Revolving Credit Note” shall mean and be a Revolving Credit Note as defined in this Agreement.

  • Information Privacy and Security Laws means all applicable Legal Requirements relating to the processing, use, disclosure, collection, privacy, processing, transfer or security of Protected Information, surveillance, espionage or national security and all regulations promulgated and guidance issued by Governmental Bodies thereunder.

  • Guaranty and Security Agreement means a guaranty and security agreement, dated as of even date with this Agreement, in form and substance reasonably satisfactory to Agent, executed and delivered by each of the Loan Parties to Agent.