Backup Security Sample Clauses

Backup Security. The OAG will have the right to establish backup security for any State Data and to keep backup copies of State Data in its possession if it chooses. At the OAG’s Contract Manager or designee request, the Contractor will provide the OAG with downloads of State Data to enable the OAG to maintain such backup copies.
AutoNDA by SimpleDocs
Backup Security. Navient shall have the right to establish backup security for Navient Data and to keep backup copies of the Navient Data in the Navient Entities’ possession at Navient’s expense if Navient so chooses. NAVIENT PROPRIETARY AND CONFIDENTIAL MASTER TERMS AGREEMENT
Backup Security. CIGNA shall have the right to establish additional Data backups (as a supplement to any of Vendor’s obligations under a SOW) for any Data and to keep backup copies of this Data in CIGNA’s possession. Should CIGNA choose to exercise its rights under this Section 3.2, related expenses shall be borne by CIGNA.

Related to Backup Security

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Trustee, Paying Agents, Conversion Agents or Note Registrar May Own Notes The Trustee, any Paying Agent, any Conversion Agent or Note Registrar, in its individual or any other capacity, may become the owner or pledgee of Notes with the same rights it would have if it were not the Trustee, Paying Agent, Conversion Agent or Note Registrar.

  • Trustee, Paying Agents, Conversion Agents, Bid Solicitation Agent or Note Registrar May Own Notes The Trustee, any Paying Agent, any Conversion Agent, Bid Solicitation Agent (if other than the Company or any Affiliate thereof) or Note Registrar, in its individual or any other capacity, may become the owner or pledgee of Notes with the same rights it would have if it were not the Trustee, Paying Agent, Conversion Agent, Bid Solicitation Agent or Note Registrar.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Security Notwithstanding anything herein to the contrary, except for Section 27, to the extent requested by Indemnitee and approved by the Board, the Company may at any time and from time to time provide security to Indemnitee for the Company’s obligations hereunder through an irrevocable bank line of credit, funded trust or other collateral. Any such security, once provided to Indemnitee, may not be revoked or released without the prior written consent of Indemnitee.

Time is Money Join Law Insider Premium to draft better contracts faster.