Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.
Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.
LOCATION OF QUALIFIED PROPERTY AND INVESTMENT The Land on which the Qualified Property shall be located and on which the Qualified Investment shall be made is described in EXHIBIT 2, which is attached hereto and incorporated herein by reference for all purposes. The Parties expressly agree that the boundaries of the Land may not be materially changed from its configuration described in EXHIBIT 2 unless amended pursuant to the provisions of Section 10.2 of this Agreement.
Collateral Each of the Banks represents to the Agent and each of the other Banks that it in good faith is not relying upon any "margin stock" (as defined in Regulation U) as collateral in the extension or maintenance of the credit provided for in this Agreement.
Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data, Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less stringent than the safeguards used by County. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information and cyber security program prior to commencement of Services and from time to time during the term of this Contract. All data belongs to the County and shall be destroyed or returned at the end of the contract via digital wiping, degaussing, or physical shredding as directed by County.
CREDIT AND COLLATERAL EXCEPTIONS (1) Within ninety (90) days the Board shall obtain current and satisfactory credit information on all loans lacking such information, including those listed in the XXX, in any subsequent Report of Examination, in any internal or external loan review, or in any listings of loans lacking such information provided to management by the National Bank Examiners at the conclusion of an examination.
Electronic PHI Security Rule Obligations 5.1 With respect to Electronic PHI, Business Associate shall:
Safekeeping of Securities 6.1 Records of uncertificated Securities held by Computershare shall be kept and maintained in the manner provided for in the Securities Legislation.
Investment of Account Assets a. All contributions to the custodial account shall be invested in the shares of the Provident Trust Mutual Funds, Inc. or, if available, any other series of Provident Trust Mutual Funds, Inc. or other regulated investment companies for which Provident Trust Company serves as Investment Advisor or designates as being eligible for investment. Shares of stock of an Investment Company shall be referred to as “Investment Company Shares”. To the extent that two or more funds are available for investment, contributions shall be invested in accordance with the depositor’s investment election.