1Security Sample Clauses

1Security. In order to secure the payment and performance of all of the Obligations, Xxxxxx agrees to provide or cause there to be provided the following security:
AutoNDA by SimpleDocs
1Security. In order to secure the payment and performance of all of the Obligations, Lessee agrees to provide or cause there to be provided the following security:

Related to 1Security

  • Cybersecurity (i)(x) There has been no security breach or other compromise of or relating to any of the Company’s or any Subsidiary’s information technology and computer systems, networks, hardware, software, data (including the data of its respective customers, employees, suppliers, vendors and any third party data maintained by or on behalf of it), equipment or technology (collectively, “IT Systems and Data”) and (y) the Company and the Subsidiaries have not been notified of, and has no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to its IT Systems and Data; (ii) the Company and the Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Data and to the protection of such IT Systems and Data from unauthorized use, access, misappropriation or modification, except as would not, individually or in the aggregate, have a Material Adverse Effect; (iii) the Company and the Subsidiaries have implemented and maintained commercially reasonable safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and Data; and (iv) the Company and the Subsidiaries have implemented backup and disaster recovery technology consistent with industry standards and practices.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Quebec Security To the extent that any Canadian Credit Party now or in the future is required to grant security pursuant to the laws of the Province of Quebec, each Agent (other than the Collateral Agent) and Lender acting for itself and on behalf of all present and future Affiliates of such Agent or Lender that are or become a Lender Counterparty, hereby irrevocably authorizes and appoints the Collateral Agent to act as the holder of an irrevocable power of attorney (fondé de pouvoir) (within the meaning of Article 2692 of the Civil Code of Quebec) in order to hold any hypothec granted under the laws of the Province of Quebec as security for any debenture, bond or other title of indebtedness that may be issued by any Canadian Credit Party and to exercise such rights and duties as are conferred upon a fondé de pouvoir under the relevant deed of hypothec and applicable laws (with the power to delegate any such rights or duties). Moreover, in respect of any pledge by any such Canadian Credit Party of any such debenture, bond or other title of indebtedness as security in respect of any Obligations, the Collateral Agent shall also be authorized to hold such debenture, bond or other title of indebtedness as agent, mandatary, custodian and pledgee for the benefit of the Agents, the Lenders and the Lender Counterparties, the whole notwithstanding the provisions of Section 32 of the An Act respecting the Special Powers of Legal Persons (Quebec). The execution prior to the date hereof by the Collateral Agent of any deed of hypothec or other security documents made pursuant to the laws of the Province of Quebec, is hereby ratified and confirmed. Any person who becomes a Lender, Issuing Bank, an Agent or a Lender Counterparty shall be deemed to have consented to and ratified the foregoing appointment of each of the Collateral Agent as fondé de pouvoir, agent, mandatary and custodian on behalf of all Agents, Issuing Banks, Lenders and the Lender Counterparties, including such person. For greater certainty, the Collateral Agent, when acting as the holder of an irrevocable power of attorney (fondé de pouvoir), shall have the same rights, powers, immunities, indemnities and exclusions from liability as are prescribed in favour of the Collateral Agent in this Agreement, which shall apply mutatis mutandis. In the event of the resignation and appointment of a successor Collateral Agent, such successor of the Collateral Agent shall also act as the holder of an irrevocable power of attorney (fondé de pouvoir), and as agent, mandatary and custodian for the purposes set forth above. Without limiting the foregoing, none of such Lenders shall have or be deemed to have a fiduciary relationship with any Lender. The Lenders are not partners or co-venturers, and no Lender shall be liable for the acts or omissions of, or (except as otherwise set forth herein in case of the Administrative Agent) authorized to act for, any other Lender.

  • Data Security A. Identity Access Management. BNY Mellon will implement reasonable and industry recognized user access rules for users accessing Customer Data based on the need to know and the principle of least privilege, and including user ID and password requirements, session timeout and re-authentication requirements, unsuccessful login attempt limits, privileged access limits and multifactor authentication or equivalent safeguard where risk factors indicate that single factor authentication is inadequate.

  • Perfection of Transfer and Protection of Security Interests Section 4.01. Custody of Contracts.................................... 4-1 Section 4.02. Filings................................................. 4-2 Section 4.03. Name Change or Relocation............................... 4-2 Section 4.04. Chief Executive Office.................................. 4-3 Section 4.05. Costs and Expenses...................................... 4-3 -i-

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Grant of Security Each Grantor hereby grants to the Collateral Agent, for the ratable benefit of the Secured Parties, a security interest in such Grantor’s right, title and interest in and to the following, in each case, as to each type of property described below, whether now owned or hereafter acquired by such Grantor, wherever located, and whether now or hereafter existing or arising (collectively, the “Collateral”):

Time is Money Join Law Insider Premium to draft better contracts faster.