Share Charge to be Sample Clauses

Share Charge to be created in favour of the Subscriber: Each of the Chargor (as defined below) and the Subscriber had on 7 February 2018 entered into a share charge agreement (“Share Charge Agreement”):
AutoNDA by SimpleDocs

Related to Share Charge to be

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Share Certificates In lieu of issuing certificates for shares, the Trustees or the transfer agent either may issue receipts therefor or may keep accounts upon the books of the Trust for the record holders of such shares, who shall in either case, for all purposes hereunder, be deemed to be the holders of certificates for such shares as if they had accepted such certificates and shall be held to have expressly assented and agreed to the terms hereof. The Trustees at any time may authorize the issuance of share certificates. In that event, each shareholder shall be entitled to a certificate stating the number of shares owned by him or her, in such form as shall be prescribed from time to time by the Trustees. Such certificate shall be signed by the President or Vice President and by the Treasurer or Assistant Treasurer. Such signatures may be facsimile if the certificate is signed by a transfer agent, or by a registrar, other than a Trustee, officer or employee of the Trust. In case any officer who has signed or whose facsimile signature has been placed on such certificate shall cease to be such officer before such certificate is issued, it may be issued by the Trust with the same effect as if he or she were such officer at the time of its issue.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • Charge / Transfer k. If the separate document of title or strata title for the Property has been issued whether before on or after the date of auction sale, the Assignee shall not be required to procure a Memorandum of Transfer nor to register its charge as prescribed by the National Land Code 1965 or Sarawak Land Code or the Land Ordinance Cap. 68 of the Laws of Sabah (where applicable) in favour of the Purchaser from the Developer and/or Proprietor (as the case may be).

  • Charge Nurse A charge nurse is an experienced nurse who is assigned the responsibility for the nursing activity and patient care on a single nursing unit for one (1) or more shifts. Nurses assigned charge responsibilities will have these additional responsibilities considered in their direct patient care assignments.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Common Stock 1 Company........................................................................1

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

Time is Money Join Law Insider Premium to draft better contracts faster.