Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.
E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA.
STATE SECURITY 4.01 Nothing in this Agreement shall be construed as requiring the Employer to do or refrain from doing anything contrary to any instruction, direction or regulations given or made by or on behalf of the Government of Canada in the interest of the safety or security of Canada or any state allied or associated with Canada.
JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.
Multiple Security If (a) the Premises shall consist of one or more parcels, whether or not contiguous and whether or not located in the same county, or (b) in addition to this Mortgage, Mortgagee shall now or hereafter hold one or more additional mortgages, liens, deeds of trust or other security (directly or indirectly) for the Indebtedness upon other property in the State in which the Premises are located (whether or not such property is owned by Mortgagor or by others) or (c) both the circumstances described in clauses (a) and (b) shall be true, then to the fullest extent permitted by law, Mortgagee may, at its election, commence or consolidate in a single foreclosure action all foreclosure proceedings against all such collateral securing the Indebtedness (including the Mortgaged Property), which action may be brought or consolidated in the courts of any county in which any of such collateral is located. Mortgagor acknowledges that the right to maintain a consolidated foreclosure action is a specific inducement to Mortgagee to extend the Indebtedness, and Mortgagor expressly and irrevocably waives any objections to the commencement or consolidation of the foreclosure proceedings in a single action and any objections to the laying of venue or based on the grounds of forum non conveniens which it may now or hereafter have. Mortgagor further agrees that if Mortgagee shall be prosecuting one or more foreclosure or other proceedings against a portion of the Mortgaged Property or against any collateral other than the Mortgaged Property, which collateral directly or indirectly secures the Indebtedness, or if Mortgagee shall have obtained a judgment of foreclosure and sale or similar judgment against such collateral, then, whether or not such proceedings are being maintained or judgments were obtained in or outside the State in which the Premises are located, Mortgagee may commence or continue foreclosure proceedings and exercise its other remedies granted in this Mortgage against all or any part of the Mortgaged Property and Mortgagor waives any objections to the commencement or continuation of a foreclosure of this Mortgage or exercise of any other remedies hereunder based on such other proceedings or judgments, and waives any right to seek to dismiss, stay, remove, transfer or consolidate either any action under this Mortgage or such other proceedings on such basis. Neither the commencement nor continuation of proceedings to foreclose this Mortgage nor the exercise of any other rights hereunder nor the recovery of any judgment by Mortgagee in any such proceedings shall prejudice, limit or preclude Mortgagee's right to commence or continue one or more foreclosure or other proceedings or obtain a judgment against any other collateral (either in or outside the State in which the Premises are located) which directly or indirectly secures the Indebtedness, and Mortgagor expressly waives any objections to the commencement of, continuation of, or entry of a judgment in such other proceedings or exercise of any remedies in such proceedings based upon any action or judgment connected to this Mortgage, and Mortgagor also waives any right to seek to dismiss, stay, remove, transfer or consolidate either such other proceedings or any action under this Mortgage on such basis. It is expressly understood and agreed that to the fullest extent permitted by law, Mortgagee may, at its election, cause the sale of all collateral which is the subject of a single foreclosure action at either a single sale or at multiple sales conducted simultaneously and take such other measures as are appropriate in order to effect the agreement of the parties to dispose of and administer all collateral securing the Indebtedness (directly or indirectly) in the most economical and least time-consuming manner.
Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.
Performance Security 47.1 Within twenty-one (21) days of the receipt of Letter of Acceptance from the Procuring Entity, the successful Tenderer, if required, shall furnish the Performance Security in accordance with the GCC 18, using for that purpose the Performance Security Form included in Section X, Contract Forms. If the Performance Security furnished by the successful Tenderer is in the form of a bond, it shall be issued by a bonding or insurance company that has been determined by the successful Tenderer to be acceptable to the Procuring Entity. A foreign institution providing a bond shall have a correspondent financial institution located in Kenya, unless the Procuring Entity has agreed in writing that a correspondent financial institution is not required. 47.2 Failure of the successful Tenderer to submit the above-mentioned Performance Security or sign the Contract shall constitute sufficient grounds for the annulment of the award and forfeiture of the Tender Security. In that event the Procuring Entity may award the Contract to the Tenderer offering the next lowest Evaluated Tender. 47.3 Performance security shall not be required for a contract, if so specified in the TDS.
Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.