Security Provider to bear cost Sample Clauses

Security Provider to bear cost. Anything which must be done by an Security Provider under any Finance Document, whether or not at the request of the Lender, must be done at the cost of the Security Provider.
AutoNDA by SimpleDocs

Related to Security Provider to bear cost

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Disclosure to numbering service providers (a) Any Finance Party may disclose to any national or international numbering service provider appointed by that Finance Party to provide identification numbering services in respect of this Agreement, the Facility and/or one or more Obligors the following information:

  • Direction to Account Debtors; Contracting Parties; etc Subject to the Intercreditor Agreement, upon the occurrence and during the continuance of an Event of Default (but without limiting the provisions of the Credit Agreement), if the Collateral Agent so directs any Grantor, such Grantor agrees (x) to cause all payments on account of the Accounts and Contracts to be made directly to the Cash Collateral Account, (y) that the Collateral Agent may, at its option, directly notify the obligors with respect to any Accounts and/or under any Contracts to make payments with respect thereto as provided in the preceding clause (x), and (z) that the Collateral Agent may enforce collection of any such Accounts and Contracts and may adjust, settle or compromise the amount of payment thereof, in the same manner and to the same extent as such Grantor. Subject to the Intercreditor Agreement, without notice to or assent by any Grantor, the Collateral Agent may, upon the occurrence and during the continuance of an Event of Default, apply any or all amounts then in, or thereafter deposited in, the Cash Collateral Account toward the payment of the Obligations in the manner provided in Section 5.4 of this Agreement. The reasonable out-of-pocket costs and expenses of collection (including reasonable out-of-pocket attorneys’ fees), whether incurred by a Grantor or the Collateral Agent, shall be borne by the relevant Grantor. The Collateral Agent shall deliver a copy of each notice given to any such obligors referred to in the preceding clause (y) to the relevant Grantor, provided that (x) the failure by the Collateral Agent to so notify such Grantor shall not affect the effectiveness of such notice or the other rights of the Collateral Agent created by this Section 3.3 and (y) no such notice shall be required if an Event of Default of the type described in Section 8.01(f) of the Credit Agreement has occurred and is continuing.

  • Account Verification Whether or not a Default or Event of Default exists, Agent shall have the right at any time, in the name of Agent, any designee of Agent or any Borrower, to verify the validity, amount or any other matter relating to any Accounts of Borrowers by mail, telephone or otherwise. Borrowers shall cooperate fully with Agent in an effort to facilitate and promptly conclude any such verification process.

  • Third Party Providers Except for those terms and conditions that specifically apply to Third Party Providers, under no circumstances shall any other person be considered a third party beneficiary of this Agreement or otherwise entitled to any rights or remedies under this Agreement. Except as may be provided in Third Party Agreements, Company shall have no rights or remedies against Third Party Providers, Third Party Providers shall have no liability of any nature to the Company, and the aggregate cumulative liability of all Third Party Providers to the Company shall be $1.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Endorsement and Collection of Checks, Etc The Custodian is hereby authorized to endorse and collect all checks, drafts or other orders for the payment of money received by the Custodian for the account of a Portfolio.

  • Maintenance of Securities and Cash at Bank and Subcustodian Locations Unless Instructions specifically require another location acceptable to the Bank:

Time is Money Join Law Insider Premium to draft better contracts faster.