Common Access Security Sample Clauses

Common Access Security. Tenant agrees to coordinate and share master keys with
AutoNDA by SimpleDocs

Related to Common Access Security

  • Access and Security Customer will be fully responsible for any charges, costs, expenses (other than those included in the Internet Data Center Services), and third party claims that may result from its use of, or access to, the Internet Data Centers and/or the Customer Area including but not limited to any unauthorized use of any access devices provided by Exodus hereunder. Except with the advanced written consent of Exodus, Customer's access to the Internet Data Centers will be limited solely to the individuals identified and authorized by Customer to have access to the Internet Data Centers and the Customer Area in accordance with this Agreement, as identified in the Customer Registration Form, as amended from time to time, which is hereby incorporated by this reference ("Representatives").

  • Replacement of Note 2.1 In the event that this Note is mutilated, destroyed, lost or stolen, Payor shall, at its sole expense, execute, register and deliver a new Note, in exchange and substitution for this Note, if mutilated, or in lieu of and substitution for this Note, if destroyed, lost or stolen. In the case of destruction, loss or theft, Payee shall furnish to Payor indemnity reasonably satisfactory to Payor, and in any such case, and in the case of mutilation, Payee shall also furnish to Payor evidence to its reasonable satisfaction of the mutilation, destruction, loss or theft of this Note and of the ownership thereof. Any replacement Note so issued shall be in the same outstanding principal amount as this Note and dated the date to which interest shall have been paid on this Note or, if no interest shall have yet been paid, dated the date of this Note.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Holding and Using Posted Collateral (i) Eligibility to Hold Posted Collateral; Custodians. Counterparty and its Custodian will be entitled to hold Posted Collateral pursuant to Paragraph 6(b); provided that the following conditions applicable to it are satisfied:

  • Surrender of Notes Upon Final Payment By acceptance of any Note, the Holder thereof agrees to surrender such Note to the Indenture Trustee promptly, prior to such Noteholder's receipt of the final payment thereon.

  • Collateral and Security Section 10.01

  • Establishment of Collateral Account The Securities Intermediary hereby confirms that:

  • Establishment of Certificate Distribution Account (a) Except as otherwise provided in Section 5.2, the Administrator, for the benefit of the Certificateholders, shall establish and maintain in the name of the Trust an Eligible Deposit Account known as the Ally Auto Receivables Trust 2014-SN1 Certificate Distribution Account (the “Certificate Distribution Account”), bearing an additional designation clearly indicating that the funds deposited therein are held for the benefit of the Certificateholders.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • ACCESS AND NOTICE 10 4.4 APPROVALS OF THIRD PARTIES AND PERMITS AND CONSENTS . . . . . . . . . . . 10 4.5

Time is Money Join Law Insider Premium to draft better contracts faster.