Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.
Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.
Financial Ability Each of the Buyer Parties acknowledges that its obligation to consummate the transactions contemplated by this Agreement and the Brewery Transaction is not and will not be subject to the receipt by any Buyer Party of any financing or the consummation of any other transaction other than the occurrence of the GM Transaction Closing and, in the case of the Brewery Transaction, the consummation of the transactions contemplated by this Agreement. The Buyer Parties have delivered to ABI a true, complete and correct copy of the executed definitive Second Amended and Restated Interim Loan Agreement, dated as of February 13, 2013, among Bank of America, N.A. (“Bank of America”), JPMorgan Chase Bank N.A. (“JPMorgan”) and CBI (collectively, the “Financing Commitment”), pursuant to which, upon the terms and subject to the conditions set forth therein, the lenders party thereto have committed to lend the amounts set forth therein (the “Financing”) for the purpose of funding the transactions contemplated by this Agreement and the Brewery Transaction. The Buyer Parties have delivered to ABI true, complete and correct copies of the fee letter and engagement letters relating to the Financing Commitment (redacted only as to the matters indicated therein), the Financing Commitment has not been amended or modified prior to the date of this Agreement, and, as of the date hereof, the respective commitments contained in the Financing Commitment have not been withdrawn, terminated or rescinded in any respect. There are no agreements, side letters or arrangements to which CBI or any of its Affiliates is a party relating to the Financing Commitment that could affect the availability of the Financing. The Financing Commitment constitutes the legally valid and binding obligation of CBI and, to the Knowledge of CBI, the other parties thereto, enforceable in accordance with its terms (except as such enforceability may be limited by bankruptcy, insolvency, fraudulent conveyance, reorganization, moratorium and other similar Laws of general applicability relating to or affecting creditors’ rights, and by general equitable principles). The Financing Commitment is in full force and effect and has not been withdrawn, rescinded or terminated or otherwise amended or modified in any respect, and no such amendment or modification is contemplated. Neither CBI nor any of its Affiliates is in breach of any of the terms or conditions set forth in the Financing Commitment, and assuming the accuracy of the representations and warranties set forth in Article 4 and performance by ABI of its obligations under this Agreement and the Brewery SPA, as of the date hereof, no event has occurred which, with or without notice, lapse of time or both, would reasonably be expected to constitute a breach, default or failure to satisfy any condition precedent set forth therein. As of the date hereof, no lender has notified CBI of its intention to terminate the Financing Commitment or not to provide the Financing. There are no conditions precedent or other contingencies related to the funding of the full amount of the Financing, other than as expressly set forth in the Financing Commitment. The aggregate proceeds available to be disbursed pursuant to the Financing Commitment, together with available cash on hand and availability under CBI’s existing credit facility, will be sufficient for the Buyer Parties to pay the Purchase Price hereunder and under the Brewery SPA and all related fees and expenses on the terms contemplated hereby and thereby in accordance with the terms of this Agreement and the Brewery SPA. As of the date hereof, CBI has paid in full any and all commitment or other fees required by the Financing Commitment that are due as of the date hereof. As of the date hereof, the Buyer Parties have no reason to believe that CBI and any of its applicable Affiliates will be unable to satisfy on a timely basis any conditions to the funding of the full amount of the Financing, or that the Financing will not be available to CBI on the Closing Date.
Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.