Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.
Application of Moneys All moneys received by the Agent and/or the Security Trustee under or pursuant to any of the Security Documents and expressed to be applicable in accordance with the provisions of this clause 13.1 or in a manner determined in the Security Trustee’s or (as the case may be) the Agent’s discretion, shall be applied in the following manner:
Payment of Money to Province The Recipient will pay any money owing to the Province by cheque payable to the “Ontario Minister of Finance” and delivered to the Province as provided for in Schedule “B".
Exception to Obligations Neither Party's obligations under this Section shall apply to the extent the infringement is caused by: (i) modification of the facilities or equipment (including software) by the indemnitee; (ii) use by the indemnitee of the facilities or equipment (including software) in combination with equipment or facilities (including software) not provided or authorized by the indemnitor, provided the facilities or equipment (including software) would not be infringing if used alone; (iii) conformance to specifications of the indemnitee which would necessarily result in infringement; or (iv) continued use by the indemnitee of the affected facilities or equipment (including software) after being placed on notice to discontinue use as set forth herein.
Payment of Monthly Bills 2.2.1 The Buying Entity shall pay the amount payable under the Monthly Bill on or before the Due Date i.e. within 30 days of presentation of bill within official hours, to such account of SECI, as shall have been previously notified to the Buying Entity in accordance with Article 2.2.2 below.
Xxxxxxx Money (Security Deposit) 5.1 While submitting commercial bid, the BIDDER shall deposit an amount………. (to be specified in RFP) as Xxxxxxx Money/Security Deposit, with the BUYER through any of the following instruments: