Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.
Transaction Security Each of the Parties agrees that the Transaction Security shall rank and secure the Credit Facility Liabilities, the Hedging Liabilities and the Pari Passu Debt Liabilities (subject to the terms of this Agreement) pari passu and without any preference between them (but only to the extent that such Transaction Security is expressed to secure those Liabilities).
Loan Documentation The documentation (“Loan Documentation”) governing or relating to the material loan and credit-related assets (“Loan Assets”) included in the loan portfolio of the Seller Subsidiaries is legally sufficient for the purposes intended thereby and creates enforceable rights of the Seller Subsidiaries in accordance in all material respects with the terms of such Loan Documentation, subject to applicable bankruptcy, insolvency, reorganization, moratorium, fraudulent conveyance and other similar laws relating to or affecting the enforcement of creditors’ rights generally, by general equitable principles (regardless of whether enforceability is considered in a proceeding in equity or at law) and by an implied covenant of good faith and fair dealing, except for such insufficiencies as would not have a material adverse effect on Seller. Except as set forth in Section 3.01(j) of the Seller Disclosure Schedule, no debtor under any of the Loan Documentation has asserted as of the date hereof any claim or defense with respect to the subject matter thereof, which claim or defense, if determined adversely to Seller, would have a material adverse effect on Seller. All loans and extensions of credit that have been made by the Seller Subsidiaries comply in all material respects with applicable regulatory limitations and procedures.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.
Closing Documentation The Buyer shall have received the following documents, agreements and instruments from the Seller:
Supporting Documentation Upon request, the HSP will provide the LHIN with proof of the matters referred to in this Article.
Closing Documentation, etc For purposes of determining compliance with the conditions set forth in §12, each Lender that has executed this Credit Agreement shall be deemed to have consented to, approved or accepted, or to be satisfied with, each document and matter either sent, or made available, by any Agent or any Co-Lead Arranger to such Lender for consent, approval, acceptance or satisfaction, or required thereunder to be consented to or approved by or acceptable or satisfactory to such Lender, unless an officer of the Administrative Agent active upon the Borrowers’ account shall have received notice from such Lender prior to the Closing Date specifying such Lender’s objection thereto and such objection shall not have been withdrawn by notice to the Administrative Agent to such effect on or prior to the Closing Date.
Additional Documentation Execute and deliver, or cause to be executed and delivered, any and all other agreements, instruments or documents which Lender may reasonably request in order to give effect to the transactions contemplated under this Loan Agreement and the other Loan Documents.