Consent to Security and Notices Sample Clauses

Consent to Security and Notices. Section 2.01 Consent to Security N S R : ( ) D : ( ) I P F ; F ( ) ; I E M P ( ) S 2.01( ): ( ) ( ) D ; , , S R ( ) D S 2.01; ( ) , , S 2.01( ), I S R ; ( ) P F , D , , , , S R , .
AutoNDA by SimpleDocs
Consent to Security and Notices 

Related to Consent to Security and Notices

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Privacy Consent; Consent to Publication of Agreement Contributor consents to the OpenID Privacy Policy and also agrees that OIDF may publish a copy of this Agreement as signed by Contributor via posting on the OIDF publicly-accessible website, and Contributor consents to such publication. If Contributor is a Legal Entity Contributor, it also represents that it has obtained appropriate consent under applicable law from all individuals listed in this Agreement to the publication of this Agreement and their personal information listed herein. The parties have formed this Agreement as of the Effective Date. OPENID FOUNDATION (“CONTRIBUTOR”) By: (Sign) Xxxx Xxxxxx By: (Sign) Xxxxxx Xxxxxxxxx Name: (Print) Title: Program Manager 7/21/2022 Name: (Print) Title: Xxxxxx Xxxxxxxxx 7/18/2022

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • RECEIPT AND PUBLICATION OF NOTICES 11.1 Immediately after it receives a demand or notice from any Noteholder in accordance with the Conditions, the Agent shall forward a copy to the Issuer.

  • Publication of notices Any obligation the Agents may have to publish a notice to Holders of Global Notes on behalf of the Issuer will be met upon delivery of the notice to DTC.

  • Waiver of Notice Borrower shall not be entitled to any notices of any nature whatsoever from Lender except with respect to matters for which this Agreement or the other Loan Documents specifically and expressly provide for the giving of notice by Lender to Borrower and except with respect to matters for which Borrower is not, pursuant to applicable Legal Requirements, permitted to waive the giving of notice. Borrower hereby expressly waives the right to receive any notice from Lender with respect to any matter for which this Agreement or the other Loan Documents do not specifically and expressly provide for the giving of notice by Lender to Borrower.

  • Effect of Notice Any notice given by the indemnifying Party to an Indemnified Party referred to in Sections 12.1(c) or 12.2(d) above of participation in or control of any action by the indemnifying Party will in no event be deemed to be an admission by the indemnifying Party of liability, culpability or responsibility, and the indemnifying Party will remain free to contest liability with respect to the claim among the Parties or otherwise.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Institution of Legal Actions Any legal actions related to or arising out of this Agreement must be instituted in the District Court of Xxxxxxx County, Kansas or, if federal jurisdiction exists, in the Federal District Court in the District of Kansas.

Time is Money Join Law Insider Premium to draft better contracts faster.