American Regent Inc Sample Clauses

American Regent Inc and Iomed shall cooperate fully in estimating and scheduling production for the first firm order to be placed by Iomed. The first firm order shall cover a period of three (3) consecutive calendar months, Thereafter, firm orders shall be placed monthly and shall cover the next succeeding third month. At the time Iomed places its firm monthly orders, Iomed shall provide to American Regent Inc. Iomed's estimate of its monthly requirements for the next succeeding nine (9) calendar month period. It is the intent that at all times American Regent Inc. shall have in hand firm monthly orders covering the current three (3) calendar month period and Iomed's estimates of its monthly requirements for the next succeeding nine (9) calendar month period.
AutoNDA by SimpleDocs

Related to American Regent Inc

  • Employee Retirement Income Security Act of 1974 (a) Section 3.12(a) of the Disclosure Schedule sets forth a list of all Plans and Benefit Arrangements maintained by the Company and any of its Subsidiaries (which for purposes of this Section 3.12 will include any ERISA Affiliate with respect to any Plan subject to Title IV of ERISA). As to all such Plans and Benefit Arrangements, and except as disclosed in such Section 3.12(a) of the Disclosure Schedule:

  • Health Insurance If Subsection (b) or (c) above applies, and if the Executive elects to continue his health insurance coverage under the Consolidated Omnibus Budget Reconciliation Act of 1985, as amended (“COBRA”) following the termination of his Employment, then the Company shall pay the Executive’s monthly premium under COBRA until the earliest of (i) 12 months following the termination of the Executive’s Employment, or (ii) the date upon which the Executive commences employment with an entity other than the Company.

  • Telephone Consumer Protection Act Consent Each Member expressly consents to receiving calls and messages, including auto-dialed and pre-recorded message calls, and SMS messages (including text messages) from the Administrator, its affiliates, agents and others calling at their request or on their behalf, at any telephone numbers that the Member has provided to the Company or Masterworks (including any cellular telephone numbers). Member’s cellular or mobile telephone provider will charge Member according to the type of plan Member carries. Any Member may unsubscribe from receiving text messages or promotional calls at any time by (i) replying STOP, STOPALL, UNSUBSCRIBE, CANCEL, END or QUIT to any text message such Member receives from the Company or Masterworks or (ii) email to sxxxxxx@Xxxxxxxxxxx.xx with one of the forgoing words in the subject line. Each Member acknowledges and consents that following such a request to unsubscribe, such Member may receive one final text message from Masterworks confirming such request.

  • Wall Street Transparency and Accountability Act of 2010 The parties hereby agree that none of (i) Section 739 of the WSTAA, (ii) any similar legal certainty provision included in any legislation enacted, or rule or regulation promulgated, on or after the Trade Date, (iii) the enactment of the WSTAA or any regulation under the WSTAA, (iv) any requirement under the WSTAA or (v) any amendment made by the WSTAA shall limit or otherwise impair either party’s right to terminate, renegotiate, modify, amend or supplement this Confirmation or the Agreement, as applicable, arising from a termination event, force majeure, illegality, increased cost, regulatory change or similar event under this Confirmation, the Equity Definitions or the Agreement (including, but not limited to, any right arising from any Acceleration Event).

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

  • Wall Street Transparency and Accountability Act In connection with Section 739 of the Wall Street Transparency and Accountability Act of 2010 (“WSTAA”), the parties hereby agree that neither the enactment of WSTAA or any regulation under the WSTAA, nor any requirement under WSTAA or an amendment made by WSTAA, shall limit or otherwise impair either party’s otherwise applicable rights to terminate, renegotiate, modify, amend or supplement this Confirmation or the Agreement, as applicable, arising from a termination event, force majeure, illegality, increased costs, regulatory change or similar event under this Confirmation, the Equity Definitions incorporated herein, or the Agreement (including, but not limited to, rights arising from Change in Law, Hedging Disruption, Increased Cost of Hedging, an Excess Ownership Position, or Illegality (as defined in the Agreement)).

  • Defend Trade Secrets Act of 2016 The Executive understands that pursuant to the federal Defend Trade Secrets Act of 2016, the Executive shall not be held criminally or civilly liable under any federal or state trade secret law for the disclosure of a trade secret that (a) is made (i) in confidence to a federal, state, or local government official, either directly or indirectly, or to an attorney; and (ii) solely for the purpose of reporting or investigating a suspected violation of law; or (b) is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal.

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!