3Security Sample Clauses

3Security. Provider will comply with the Security Policy, if any. 5. Payment & Taxes
AutoNDA by SimpleDocs
3Security. The Customer is solely responsible for providing adequate security to prevent unauthorized Covered System access to Philips (or its third-party vendors) proprietary and confidential information.
3Security. The Company shall have the right in keeping with the provisions of Applicable Law, to directly or indirectly or under contract with other persons, establish and maintain its own security force for the purpose of protecting its staff or maintaining security within the Mining Area, with power both (i) of detention (any detained person to be handed over to the appropriate State authorities as soon as practicable), and (ii) exclusion from the Mining Area and such other parts of the Project Area as may be properly restricted for safety or security reasons. Any such security force will be subject to Applicable Law at all times but shall not have the power of interrogation. The Company shall ensure and monitor that the security force at all times will conduct itself in accordance with Applicable Law (including all Laws relating to apprehension and detention and human rights) and the Voluntary Principles on Security and Human Rights.
3Security. 1Boards shall take all practical steps to ensure the safety of employees especially when employees undertake banking duties and work in isolated areas on the school site.
3Security. 3.5.1 The supplier will ensure that security and confidentiality protocols are followed which include but are not limited to: Ensuring security compliance (DBS Checks) of the supplier’s staff Ensuring confidentiality of personal information under the Data Protection Act Ensuring confidentiality of commercial information Safeguarding any equipment provided by the sponsor
3Security. 5G Challenge Test Team will employ commercially reasonable security and network monitoring consistent with a testing laboratory during the Event. This includes, but is not limited to, the use of firewalls, role-based access controls, network monitoring and intrusion detection, anti-virus software and regular maintenance and patching of vulnerabilities. 5G Challenge Test Team reserves the right to disable Contestant systems and/or network traffic to/from Contestant systems if 5G Challenge Test Team considers the activity malicious or detrimental to 5G Challenge Test Team’s systems and/or detrimental to the ability to conduct the Event in a fair and equitable manner. If the Contestant does not employ commercially reasonable practices to monitor and secure its systems (hardware and/or software), 5G Challenge Test Team has the discretion to remove the contestant from the Event. Contestant is liable and indemnifies 5G Challenge Test Team for any damages arising from or related to its participation in the Event.
3Security. All present and future amounts owing by the Borrower to the Senior Creditors in respect of the Finance Documents will be secured by the Security Documents.
AutoNDA by SimpleDocs
3Security. Data Recipient shall take all reasonable security precautions to prevent unauthorized individuals or entities from gaining access or disclosure to the Data through either Data Recipient’s services or Data Recipient’s System. Data Recipient shall comply with all reasonable security specifications or requirements of Omega or provide assurances to Omega of the use of comparable security specifications or requirements in order to prevent the Data from being improperly used or accessed other than as expressly permitted herein. Data Recipient shall notify Omega promptly upon any breach in its security procedures related to the Data of which it becomes aware and will use commercially reasonable efforts to cooperate with and assist Omega to mitigate the adverse effects of such breach to Omega, its customers or its Data System.
3Security. During the term of this Agreement, Cardinal Health shall employ reasonable security measures and policies designed to safeguard the integrity, accessibility, and confidentiality of Client’s data resident on the System and establish and maintain reasonable disaster and emergency recovery plans designed to minimize disruption from System operation interruptions. Such measures shall be no less secure than those utilized by Cardinal Health to protect its own confidential information.
3Security. Payment and performance of the Notes will be secured by a single real estate mortgage in substantially the form attached hereto as EXHIBIT B (the "Security Instrument"). The Security Instrument will encumber Xxxx Land-East and other unencumbered real property currently owned by the Company also located in Shoshone County, Idaho). Each Purchaser will be a mortgagee under the Security Instrument. The Purchasers holding Notes with an aggregate unpaid principal balance that exceeds fifty percent (50%) of the outstanding principal balances of all Notes shall appoint one Purchaser to act as the agent under the Security Interest (the "Agent") to take such actions as Agent deems appropriate, and to exercise such powers as are delegated to Agent by the terms of, and pursuant to, the Security Instrument and together with such powers as are incidental thereto.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!