Information Sources definition

Information Sources means information suppliers including but not limited to HKEX Information Services Limited, HKFE, The Stock Exchange of Hong Kong Limited, any other Exchanges and their respective relevant Affiliates and data providers whose information is contained within the Electronic Services;
Information Sources means, in respect of Customer, persons nominated as trade references, bankers or any other credit providers. Insolvency Event means in relation to Customer:
Information Sources means (i) the relevant Account Bank, with respect to the FSAM Assets and the collateral posting accounts held by the Account Bank for the benefit of GIC Holders, (ii) the custodian of the Dexia Collateral pursuant to the Dexia CSAs, with respect to the Dexia Collateral.

Examples of Information Sources in a sentence

  • Distributor irrevocably authorizes Zeltiq, its employees and agents to make such inquiries as it deems necessary to investigate the credit worthiness or other information requirements of Distributor from time to time including the making of inquiries of persons that are trade references, the bankers of Distributor or any other credit providers (collectively the “Information Sources”) and Distributor hereby authorizes the Information Sources to disclose to Zeltiq such information concerning Distributor.

  • In the event that System Security Procedures or general security measures are compromised in a way that results in unauthorized access to Information Sources, the creation or approval of unauthorized transactions, or the creation or approval of unauthorized changes in the System (a “Breach”), Customer agrees to assist Bank in determining the manner and source of the Breach.

  • Customer will take appropriate security measures to ensure that: (a) only authorized Personnel will have access to Information Sources, and (b) that the information obtained from Information Sources is not disclosed to third parties.

  • Customer will establish, maintain and enforce physical and logical commercially reasonable security practices, techniques and procedures with respect to access, storage and maintenance to safeguard against unauthorized transmissions and unauthorized access to the Information Sources.

  • Customer will notify Bank immediately, followed by written confirmation, if Customer has reason to believe or suspects there has been any unauthorized access to the Information Sources or unauthorized transmissions.

  • Customer warrants that no individual will be allowed to access Information Sources or create/transmit payment instructions or other orders to Bank in the absence of proper supervision and safeguards.

  • In no event will KGI or the Information Sources be liable to the Client or anyone else for any indirect, consequential, incidental, special or punitive damages, including any lost profits or lost savings, or for any third party claim of any nature whatsoever related to the provision of such information or its use.

  • KGI and/or the Information Sources endeavour to ensure the accuracy and reliability of the information provided but do not guarantee its accuracy or reliability and accept no liability (whether in tort or contract or otherwise) for any loss or damage arising from any inaccuracy or omission or from any decision, action or non-action based on or in reliance upon the information or any part thereof.

  • Nevertheless, the Bank acknowledges that it will be responsible for accurately and timely submitting the claims information that it does receive from Approved Class Action Information Sources or itself possesses; provided however, that the Customer hereby acknowledges and agrees that the Bank shall neither guarantee nor make any warranties with respect to the Approved Class Action Information Sources and to the accuracy or completeness of their information or the success of such claim.

  • Services not performed in accordance to the content of this contract shall be considered unsatisfactory and unacceptable.


More Definitions of Information Sources

Information Sources shall include, but not be limited to, (i) HCW file servers, (ii) HCW email systems or email servers, (iii) HCW laptop or desktop computers, (iv) Altor laptops or desktop computers, (v) Altor lab notebooks or physical notebooks used for Altor work while at Altor, (vi) portable storage devices (including but not limited to USB devices) of Respondents or HCW employees who previously worked for Altor or NantCell, (vii) personal emails, files, or text messages of D▇. ▇▇▇▇ and other HCW employees who previously worked for Altor or NantCell, and (viii) any backups and archives of the foregoing. A “reasonably diligent search” shall include, but not be limited to, diligent searches to identify all emails containing Altor or NantCell domain names, all documents bearing the logo of or referencing that it is an Altor or NantCell document, all documents describing or relating to Altor’s or NantCell’s research, and all documents previously downloaded from Altor or NantCell company servers.
Information Sources. States and HUD field offices. It stays with the