Security Equity definition

Security Equity. Fund: Alpha Opportunity Fund (Class A, B and C), Select 25 Fund (Class A, B and C) Mid Cap Value Institutional Fund, Small Cap Value Fund (Class A, B and I), Global Institutional Fund and All Cap Value Fund (Class A, B and I).
Security Equity means all of the issued and outstanding equity of Security.
Security Equity s life insurance shall qualify for automatic reinsurance under the Agreement provided each one of the following conditions are satisfied:

Examples of Security Equity in a sentence

  • Security Equity Fund (the "Fund") and Security Distributors, Inc.

  • Security Equity Fund (the "Company") and Security Distributors, Inc.

  • The Adviser hereby retains the Subadviser to act as investment adviser for and to manage certain assets of the Funds subject to the supervision of the Adviser and the respective Boards of Directors of SBL Fund and Security Equity Fund and subject to the terms of this Agreement; and the Subadviser hereby accepts such employment.

  • This Agreement shall become effective upon the date first above written, provided that this Agreement shall not take effect with respect to the Funds, unless it has first been approved by a vote of a majority of those directors of SBL Fund and Security Equity Fund, as applicable, who are not parties to this Agreement or interested persons of any such party, cast in person at a meeting called for the purpose of voting on such approval.

  • The security interest of the Trustee shall nevertheless come into existence and continue in the Collateral Debt Security, Equity Security or Eligible Investment so acquired, including all rights of the Issuer in and to any contracts related to and proceeds of such Collateral Debt Security, Equity Security or Eligible Investment.

  • This Agreement shall become effective upon the date first above written, provided that this Agreement shall not take effect with respect to a Fund unless it has first been approved by a vote of a majority of those directors of SBL Fund and Security Equity Fund, as applicable, who are not parties to this Agreement or interested persons of any such party, cast in person at a meeting called for the purpose of voting on such approval.

  • The schedule in 2 above is subject to the following minimum fees: (i) in the first year from the date the Enhanced Index Series of Security Equity Fund is seeded (the "Seeding Date"), no minimum fee; (ii) in the second year from the Seeding Date, $100,000 minimum and (iii) in the third year from the Seeding Date and each year thereafter, $200,000 minimum.

  • This Agreement shall become effective upon the date first above written, provided that this Agreement shall not take effect with respect to the Funds unless it has first been approved by a vote of a majority of those directors of SBL Fund and Security Equity Fund, as applicable, who are not parties to this Agreement or interested persons of any such party, cast in person at a meeting called for the purpose of voting on such approval.

  • The parties agree that the fee paid by the Adviser to the Subadviser for the services rendered by the Subadviser to the Enhanced Index Series of Security Equity Fund (the "Enhanced Index Series") shall be based on the combined average daily net assets of the Enhanced Index Series and a future series of SBL Fund with the same investment objective as the Enhanced Index Series.

  • The parties agree that the fee paid by the Adviser to the Subadviser for the services rendered by the Subadviser to the Enhanced Index Series of Security Equity Fund and Series H of SBL Fund (collectively referred to herein as the "Enhanced Index Funds"), shall be based on the combined average daily net assets of the Enhanced Index Funds.


More Definitions of Security Equity

Security Equity s Retention for Increasing Policies shall be set forth in the Life Benefits Schedule.

Related to Security Equity

  • Security Event means an immediately reportable subset of security incidents which incident would include: a. A suspected penetration of Contractor’s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed; b. Any indication, evidence, or other security documentation that the Contractor’s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication; c. A breach of the security of the Contractor’s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or, d. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor’s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.

  • Security Entitlements means the rights and property interests of an Entitlement Holder with respect to a Financial Asset.

  • Security Entitlement The meaning specified in Section 8-102(a)(17) of the UCC.

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Equity Equivalents means with respect to any Person any rights, warrants, options, convertible securities, exchangeable securities, indebtedness or other rights, in each case exercisable for or convertible or exchangeable into, directly or indirectly, Equity Interests of such Person or securities exercisable for or convertible or exchangeable into Equity Interests of such Person, whether at the time of issuance or upon the passage of time or the occurrence of some future event.