Compliance with Security Protocol Sample Clauses

Compliance with Security Protocol. If a Request (or a Request for cancellation or amendment of a Wire Transfer) received by Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer’s Request and Customer shall be obligated to pay Bank the amount of such Wire Transfer even though the Request was not authorized by Customer, provided Bank accepted the Request in good faith and acted in compliance with the Security Protocol with respect to such Request.
AutoNDA by SimpleDocs

Related to Compliance with Security Protocol

  • Compliance with OFAC None of the Company and its Subsidiaries or, to the Company’s knowledge, any director, officer, agent, employee or affiliate of the Company and its Subsidiaries or any other person acting on behalf of the Company and its Subsidiaries, is currently subject to any U.S. sanctions administered by the Office of Foreign Assets Control of the U.S. Department of the Treasury (“OFAC”), and the Company will not, directly or indirectly, use the proceeds of the Offering hereunder, or lend, contribute or otherwise make available such proceeds to any subsidiary, joint venture partner or other person or entity, for the purpose of financing the activities of any person currently subject to any U.S. sanctions administered by OFAC.

  • Compliance with Privacy Code The Corporation acknowledges that the Warrant Agent may, in the course of providing services hereunder, collect or receive financial and other personal information about such parties and/or their representatives, as individuals, or about other individuals related to the subject matter hereof, and use such information for the following purposes: (a) to provide the services required under this Indenture and other services that may be requested from time to time; (b) to help the Warrant Agent manage its servicing relationships with such individuals; (c) to meet the Warrant Agent’s legal and regulatory requirements; and (d) if Social Insurance Numbers are collected by the Warrant Agent, to perform tax reporting and to assist in verification of an individual’s identity for security purposes. The Corporation acknowledges and agrees that the Warrant Agent may receive, collect, use and disclose personal information provided to it or acquired by it in the course of its acting as agent hereunder for the purposes described above and, generally, in the manner and on the terms described in its privacy code, which the Warrant Agent shall make available on its website or upon request, including revisions thereto. Further, the Corporation agrees that it shall not provide or cause to be provided to the Warrant Agent any personal information relating to an individual who is not a party to this Indenture unless the Corporation has assured itself that such individual understands and has consented to the aforementioned uses and disclosures.

  • COMPLIANCE WITH SEC RULES If, at any time during which AVIF is serving as an investment medium for variable life insurance Contracts, 1940 Act Rules 6e-3(T) or, if applicable, 6e-2 are amended or Rule 6e-3 is adopted to provide exemptive relief with respect to Mixed and Shared Funding, AVIF agrees that it will comply with the terms and conditions thereof and that the terms of this Section 5 shall be deemed modified if and only to the extent required in order also to comply with the terms and conditions of such exemptive relief that is afforded by any of said rules that are applicable.

  • Compliance with Standards Although the standards for workmanship, material, and equipment have been selected in these specifications as a basis of reference, standards and specifications of the other bank member countries and recommendations of standards international organizations will be acceptable provided they are substantially equivalent to the designated standards and provided furthermore that the contractor submits for approval detailed specifications which he proposes to use. Reference to brand names or catalog numbers if any in these specifications have been made only for that equipment for which it has been determined that a degree of standardization is necessary to maintain certain essential features. And in certain cases such references have also been made for purposes of convenience to specify the requirements, in either case offers of alternative goods, which have similar characteristics and provide performance and quality at lease equal to those specified are acceptable. If the contractor offers materials, equipment, design calculations or tests, which conform to standards other than those specified, full details of the differences between the proposed standards and that specified in so far as they affect the design or purpose of the equipment, are to be supplied by the contractor if called upon to do so by the engineer, where required by the engineer for approval purposes, the contractor shall supply, without charge, duplicate copies of the proposed standards with English translations of the relevant portions. The contractor shall have available in his place of business (or in his supplier’s works) the relevant copies of standards or codes used for the use of the Engineer.

  • Compliance with Rules To comply with, and to require the Contractors to comply with, all rules, regulations, ordinances and laws bearing on the conduct of the work on the Improvements, including the requirements of any insurer issuing coverage on the Project and the requirements of any applicable supervising boards of fire underwriters.

  • Compliance with TIA Every amendment, waiver or supplement of this Indenture or the Securities shall comply with the TIA as then in effect.

  • Compliance with State Law The Business Associate acknowledges that by accepting the PHI from Covered Entity, it becomes a holder of medical information under the MCMRA and is subject to the provisions of that law. If the HIPAA Privacy or Security Rules and the MCMRA conflict regarding the degree of protection provided for PHI, Business Associate shall comply with the more restrictive protection requirement.

  • Compliance with Statutes Rules and Regulations

  • Compliance with FCPA Each of the Credit Parties and their Subsidiaries is in compliance with the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq., and any foreign counterpart thereto. None of the Credit Parties or their Subsidiaries has made a payment, offering, or promise to pay, or authorized the payment of, money or anything of value (a) in order to assist in obtaining or retaining business for or with, or directing business to, any foreign official, foreign political party, party official or candidate for foreign political office, (b) to a foreign official, foreign political party or party official or any candidate for foreign political office, and (c) with the intent to induce the recipient to misuse his or her official position to direct business wrongfully to such Credit Party or its Subsidiary or to any other Person, in violation of the Foreign Corrupt Practices Act, 15 U.S.C. §§ 78dd-1, et seq.

  • Compliance with Privacy Laws NCPS represents and warrants that its collection, access, use, storage, disposal and disclosure of Personal Data does and will comply with all applicable federal and state privacy and data protection laws, as well as all other applicable regulations. Without limiting the foregoing, NCPS shall implement administrative, physical and technical safeguards to protect Personal Data that are no less rigorous than accepted industry, and shall ensure that all such safeguards, including the manner in which Personal Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Escrow Agreement. NCPS shall use and disclose Personal Data solely and exclusively for the purposes for which the Personal Data, or access to it, is provided pursuant to the terms and conditions of this Escrow Agreement, and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Data for NCPS’s own purposes or for the benefit of any party other than Issuer. For purposes of this section, “Personal Data” shall mean information provided to NCPS by or at the direction of the Issuer, or to which access was provided to NCPS by or at the direction of the Issuer, in the course of NCPS’s performance under this Escrow Agreement that: (i) identifies or can be used to identify an individual (also known as a “data subject”) (including, without limitation, names, signatures, addresses, telephone numbers, e-mail addresses and other unique identifiers); or (ii) can be used to authenticate an individual (including, without limitation, employee identification numbers, government-issued identification numbers, passwords or PINs, financial account numbers, credit report information, biometric or health data, answers to security questions and other personal identifiers), including the identifying information on individuals described in Section 12.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!