Compliance with Security Policies Sample Clauses

Compliance with Security Policies. RAM personnel shall observe and comply with FLO’s reasonable and standard security procedures, rules, regulations and policies.
AutoNDA by SimpleDocs
Compliance with Security Policies. The Company has implemented and maintained reasonable written information security policies and programs that govern the Processing, security, confidentiality, integrity and availability of Sensitive Company Information and Systems (collectively, “Security Policies”). The Company has at all times complied with such Security Policies. The Security Policies and the implementations of such policies: (A) identify internal and external risks to the security of the Systems and Sensitive Company Information; (B) implement reasonable administrative, electronic and physical safeguards to control those risks and safeguard the security, confidentiality, integrity, and availability of Systems and Sensitive Company Information; (C) protect against unauthorized access to the Systems and Sensitive Company Information (including on the systems of third parties with access to such Systems or Sensitive Company Information); (D) maintain notification procedures in compliance with applicable Laws, including Privacy and Security Laws, in the case of any breach of security compromising Sensitive Company Information; (E) prohibit any unauthorized access to any non-Company system; and (F) complies with all applicable Privacy and Security Laws, the Privacy Statements, and the Company’s material contractual obligations relating to privacy, cybersecurity, data protection, or Sensitive Company Information.
Compliance with Security Policies. The Company and each of its Subsidiaries have implemented and maintained reasonable written information security policies and programs that govern the Processing, security, confidentiality, integrity and availability of Customer Data, Personal Information and Systems (collectively, “Security Policies”). The Company and its Subsidiaries have at all times materially complied with such Security Policies. The Security Policies and / or the implementations of such policies materially: (A) identify internal and external risks to the security of the Systems and Personal Information; (B) implement customary industry practices regarding administrative, electronic and physical safeguards to control those risks and safeguard the security, confidentiality, integrity, and availability of the Systems and Personal Information; (C) protect against unauthorized access to the Systems and Personal Information (including on the systems of third parties with access to such Systems or Personal Information); (D) maintain notification procedures in compliance with applicable Privacy and Security Laws, in the case of any breach of security compromising Personal Information; (E) implement customary industry practices to prohibit any unauthorized access to any non-Company systems; and (F) comply with all applicable Privacy and Security Laws, the Privacy Statements, and the Company’s and each of its Subsidiaries’ contractual obligations relating to privacy, cybersecurity, data protection, Customer Data, or Personal Information.
Compliance with Security Policies. The Company has implemented and maintained reasonable written information security policies and programs that govern the Processing, security, confidentiality, integrity and availability of IT Systems, Personal Information and Third Party Data (collectively, “Security Policies”). The Company has at all times complied with such Security Policies. The Security Policies and the implementations of such policies: (A) identify internal and external risks to the security of the IT Systems, Personal Information and Third Party Data; (B) implement customary industry practices regarding administrative, electronic and physical safeguards to control those risks and safeguard the security, confidentiality, integrity, and availability of the IT Systems, Personal Information and Third Party Data; (C) protect against unauthorized access to the IT Systems, Personal Information and Third Party Data (including on the systems of Persons with access to such IT Systems, Personal Information or Third Party Data); (D) maintain notification procedures in compliance with applicable Privacy and Security Requirements in the case of any Security Incident; and (E) comply with all applicable Privacy and Security Requirements, the Privacy Statements, and the Company’s contractual obligations relating to privacy, cybersecurity, data protection, Personal Information and Third Party Data.
Compliance with Security Policies. BH personnel shall observe and comply with LGI’s reasonable and standard security procedures, rules, regulations and policies.

Related to Compliance with Security Policies

  • Compliance with Policies Each Individual Limited Partner hereby agrees that he shall comply with all policies and procedures adopted by any member of the Och-Ziff Group or which Limited Partners are required to observe by law, or by any recognized stock exchange, or other regulatory body or authority.

  • Compliance With Insurance Requirements Borrower will comply with all Insurance requirements and will not permit any condition to exist on the Mortgaged Property that would invalidate any part of any Insurance coverage required under this Loan Agreement.

  • Compliance with OFAC None of the Company and its Subsidiaries or, to the Company’s knowledge, any director, officer, agent, employee or affiliate of the Company and its Subsidiaries or any other person acting on behalf of the Company and its Subsidiaries, is currently subject to any U.S. sanctions administered by the Office of Foreign Assets Control of the U.S. Department of the Treasury (“OFAC”), and the Company will not, directly or indirectly, use the proceeds of the Offering hereunder, or lend, contribute or otherwise make available such proceeds to any subsidiary, joint venture partner or other person or entity, for the purpose of financing the activities of any person currently subject to any U.S. sanctions administered by OFAC.

  • Compliance with Legal/Insurance Requirements, Etc Subject to the provisions of Section 5.1.2(b) and Article 8, Tenant, at its sole expense, shall (a) comply with (or cause to be complied with) all material Legal Requirements and Insurance Requirements in respect of the use, operation, maintenance, repair, alteration and restoration of any Property and with the terms and conditions of any ground lease affecting any Property, (b) perform (or cause to be performed) in a timely fashion all of Landlord’s obligations under any ground lease affecting any Property and (c) procure, maintain and comply with (or cause to be procured, maintained and complied with) all material licenses, certificates of need, permits, provider agreements and other authorizations and agreements required for any use of any Property and Tenant’s Personal Property, if any, then being made, and for the proper erection, installation, operation and maintenance of the Leased Property or any part thereof.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance with FCPA Each of the Credit Parties and their Subsidiaries is in compliance with the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq., and any foreign counterpart thereto. None of the Credit Parties or their Subsidiaries has made a payment, offering, or promise to pay, or authorized the payment of, money or anything of value (a) in order to assist in obtaining or retaining business for or with, or directing business to, any foreign official, foreign political party, party official or candidate for foreign political office, (b) to a foreign official, foreign political party or party official or any candidate for foreign political office, and (c) with the intent to induce the recipient to misuse his or her official position to direct business wrongfully to such Credit Party or its Subsidiary or to any other Person, in violation of the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq.

  • Compliance with Rules To comply with, and to require the Contractors to comply with, all rules, regulations, ordinances and laws bearing on the conduct of the work on the Improvements, including the requirements of any insurer issuing coverage on the Project and the requirements of any applicable supervising boards of fire underwriters.

  • Compliance with Local Laws Any resale of the Securities during the ‘distribution compliance period’ as defined in Rule 902(f) to Regulation S shall only be made in compliance with exemptions from registration afforded by Regulation S. Further, any such sale of the Securities in any jurisdiction outside of the United States will be made in compliance with the securities laws of such jurisdiction. The Investor will not offer to sell or sell the Securities in any jurisdiction unless the Investor obtains all required consents, if any.

Time is Money Join Law Insider Premium to draft better contracts faster.