Examples of Outsourced Functions in a sentence
The Liquidity Provider represents that the Liquidity Provider is authorized to consent to the foregoing and that the disclosure of the Liquidity Provider Information in connection with the Centralized Functions and/or Outsourced Functions does not violate any relevant data protection legislation.
Grantor and Beneficiary represent that Grantor and Beneficiary are authorized to consent to the foregoing and that the disclosure of Grantor and Beneficiary’s Information in connection with the Centralized Functions and/or Outsourced Functions does not violate any relevant data protection legislation.
Company represents that it is authorized to consent to the foregoing and that the disclosure of Company’s Information in connection with the Centralized Functions and/or Outsourced Functions does not violate any relevant data protection legislation.
Pledgor and Secured Party represent that Pledgor and Secured Party are authorized to consent to the foregoing and that the disclosure of Pledgor and Secured Party Information in connection with the Centralized Functions and/or Outsourced Functions does not violate any relevant data protection legislation.
Grantor and WestRock represent that Grantor and WestRock are authorized to consent to the foregoing and that the disclosure of Grantor and WestRock’s Information in connection with the Centralized Functions and/or Outsourced Functions does not violate any relevant data protection legislation.
The Interested Parties represent that the Interested Parties are authorized to consent to the foregoing and that the disclosure of the Interested Parties Information in connection with the Centralized Functions and/or Outsourced Functions does not violate any relevant data protection legislation.
The Corporation represents that the Corporation is authorized to consent to the foregoing and that the disclosure of the Information in connection with the Centralized Functions and/or Outsourced Functions does not, to the best of its knowledge (without any independent investigation), violate any relevant Canadian or U.S. data protection legislation.