Transfer Security definition
Examples of Transfer Security in a sentence
The Direct Transfer Security Roster constitutes the names, addresses and shares of common and preferred stock issued and outstanding as of the closing of this Agreement.
The Security Administrator named on the Enrollment Request for the Service and any other Security Administrator established by Customer via the Service shall be entitled to act as the “Funds Transfer Security Administrator” as such term or similarly equivalent function is defined in Customer’s funds transfer agreement, whether or not such persons are named in such funds transfer agreement.
In the event that Project Company does not make timely payments for such expenses, GPA shall have the right to draw such amounts from the Transfer Security and/or set off such amounts under Article 14.1(e)(iv).
In the event that Project Company has not delivered the security deposit in favor of GPA by the end of the twenty-first (21st) Contract Year, GPA shall have the right to withhold payments to Project Company (including payment amounts owed pursuant to Article 14) up to the Transfer Security amount.
You agree to abide by the security measures set forth in Exhibit B – Fund Transfer Security Measures, which is part of this Agreement.
You agree that the Wire Transfer Security Procedures constitute a commercially reasonable security procedure for you.
The Compensation Committee of the Board may periodically review the Executive’s Base Salary and may provide for such increases therein as it may, in its discretion, deem appropriate.
You agree that you will take all actions required to comply with the Wire Transfer Security Procedures.
In the event of a conflict between the security provisions of the Master Agreement and the Wire Funds Transfer Security Procedures, the terms of the Wire Funds Transfer Security Procedures will prevail with respect to Wire Funds Transfer.
ITSL and its partners adhere to the European Commission Directive on Data Protection and U.S. Safe Harbour Privacy Principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access and Enforcement.