Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.
E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
Supply Chain Security Supplier shall implement and maintain a written security program that consists of physical and procedural controls: to (a) prevent unauthorized access to Supplier’s facilities; (b) prevent finished goods or equipment from being tampered with, stolen or damaged prior to Supplier’s delivery in accordance with the terms of this Order; and (c) detect when malicious activity has occurred (the “Supply Chain Security Program”). Supplier’s Supply Chain Security Program shall align to the World Customs Organization’s SAFE Framework of Standards to Secure and Facilitate Global Trade (“SAFE Framework”) or other global security programs recognized by the World Customs Organization. Supplier shall flow down and verify the requirements of its Supply Chain Security Program to its sub-tier suppliers, if applicable. Supplier shall test its Supply Chain Security Program at least annually or whenever there are material changes in Supplier’s operations, risks or business practices. Upon Buyer’s written and reasonable request, Supplier shall provide Buyer with: (i) a copy of Supplier’s Supply Chain Security Program; (ii) an executive summary of test results and a report of corrective actions (including the timing for implementation) to be taken to remedy any deficiencies identified by such testing; and (iii) any audit results or findings resulting from Supplier’s periodic audit or testing of its sub-tier suppliers’ security programs.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.
Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.
Aviation Security 1. In accordance with their rights and obligations under international law, the Parties reaffirm that their obligation to each other to protect the security of civil aviation against acts of unlawful interference forms an integral part of this Agreement. Without limiting the generality of their rights and obligations under international law, the Parties shall in particular act in conformity with the provisions of the Convention on Offenses and Certain Other Acts Committed on Board Aircraft, done at Tokyo September 14, 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague December 16, 1970, the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done at Montreal September 23, 1971, and the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, done at Montreal February 24, 1988. 2. The Parties shall provide upon request all necessary assistance to each other to prevent acts of unlawful seizure of civil aircraft and other unlawful acts against the safety of such aircraft, of their passengers and crew, and of airports and air navigation facilities, and to address any other threat to the security of civil air navigation. 3. The Parties shall, in their mutual relations, act in conformity with the aviation security standards and appropriate recommended practices established by the International Civil Aviation Organization and designated as Annexes to the Convention; they shall require that operators of aircraft of their registry, operators of aircraft who have their principal place of business or permanent residence in their territory, and the operators of airports in their territory act in conformity with such aviation security provisions. 4. Each Party agrees to observe the security provisions required by the other Party for entry into, for departure from, and while within the territory of that other Party and to take adequate measures to protect aircraft and to inspect passengers, crew, and their baggage and carry-on items, as well as cargo and aircraft stores, prior to and during boarding or loading. Each Party shall also give positive consideration to any request from the other Party for special security measures to meet a particular threat. 5. When an incident or threat of an incident of unlawful seizure of aircraft or other unlawful acts against the safety of passengers, crew, aircraft, airports or air navigation facilities occurs, the Parties shall assist each other by facilitating communications and other appropriate measures intended to terminate rapidly and safely such incident or threat. 6. When a Party has reasonable grounds to believe that the other Party has departed from the aviation security provisions of this Article, the aeronautical authorities of that Party may request immediate consultations with the aeronautical authorities of the other Party. Failure to reach a satisfactory agreement within 15 days from the date of such request shall constitute grounds to withhold, revoke, limit, or impose conditions on the operating authorization and technical permissions of an airline or airlines of that Party. When required by an emergency, a Party may take interim action prior to the expiry of 15 days.
Portfolio Security Portfolio Security will mean any security owned by the Fund.
Collateral Security (a) The Obligations shall be secured by (a) a perfected first-priority security interest (subject to Permitted Liens entitled to priority under Applicable Law) in all Collateral, whether now owned or hereafter acquired, pursuant to the terms of the Security Agreement to which each Borrower is a party to the extent perfected by the filing of UCC financing statements; (b) a pledge of 100% of the capital stock or other Equity Interests of such Borrowers (other than the Parent) and of the Non-Borrower Subsidiaries (other than the Foreign Subsidiaries) to the Administrative Agent on behalf of the Secured Parties pursuant to the Pledge Agreement; and (c) a pledge of the capital stock or other Equity Interests of each Foreign Subsidiary (provided that not more than 65% of the total voting power of all outstanding capital stock or other Equity Interest of any such first-tier Foreign Subsidiary of a Borrower shall be required to be so pledged and no Equity Interests of any non-first-tier Foreign Subsidiary shall be provided to be so pledged); provided that the Borrowers hereby agree, upon the request of the Administrative Agent and the Required Lenders, to deliver, as promptly as practicable, but in any event within ninety (90) days after request therefor, or such other later time, if any, to which the Administrative Agent may agree, (i) certificates of titles for all or substantially all vehicles, trucks, trailers, tractors, automobiles and any other equipment covered by certificates of title owned by a Borrower (collectively, “Motor Vehicles”) with the Administrative Agent listed as lienholder therein (subject to a limited power of attorney in favor of the Parent to dispose of titled equipment) and, if required by the Administrative Agent, the Borrowers shall retain Corporation Service Company (or other similar company satisfactory to the Administrative Agent) pursuant to agreements reasonably satisfactory to the Administrative Agent pursuant to which Corporation Service Company (or such other company) will agree to act as agent for the Secured Parties with respect to the perfection of security interests in the Motor Vehicles; and (ii) mortgages with respect to Real Property and to take such other steps and make such other deliveries as may be reasonably requested by the Administrative Agent (including, without limitation, the delivery of legal opinions, Consulting Engineer’s reports, surveys, title insurance, environmental assessment reports, flood hazard certifications, evidence of flood insurance, if required, and a certification of the name and address of each real estate recording office where a mortgage on the real estate on which any Collateral consisting of fixtures may be located would be recorded) so as to provide the Administrative Agent, for the benefit of the Secured Parties, a perfected first-priority security interest in such assets, provided that to the extent that any lease of (or operating/management agreement with respect to) Real Property prohibits assignment of such lease (or operating/management agreement) without the consent of the lessor or another party thereunder, the Borrowers shall not be required to grant a mortgage on the leasehold interest under such lease, but in such event, the Borrowers agree to diligently and in good faith use its reasonable best efforts to obtain the consent (which consent shall be in form and substance reasonably satisfactory to the Administrative Agent) of the applicable lessor or other party to such leasehold mortgage (and, upon the receipt of such consent, the Borrowers shall promptly grant such leasehold mortgage and comply with the other provisions of this Section 10.15 with respect thereto). (b) In the event any Borrower disposes of any assets or Equity Interests as permitted under, and in compliance with, Section 7.04(b) (including any amendment thereof or consent thereunder), or in the event that the Parent designates any Borrower as an Excluded Subsidiary or a Non-Borrower Subsidiary hereunder and no Default would result from such designation, and so long as such Borrower (or the Parent, in the case of designating a Borrower as an Excluded Subsidiary hereunder) shall have provided the Administrative Agent with such certifications or documents, if any, as the Administrative Agent shall reasonably request, the Administrative Agent will, at the Borrowers’ sole cost and expense, and without recourse to or warranty by the Administrative Agent, execute and deliver all such forms, releases, discharges, assignments, termination statements, and similar documents as the Borrowers may reasonably request in order to release such Person from its Obligations under the Loan Documents and to release the Liens granted to the Administrative Agent with respect to such assets, Equity Interests or Borrower, as applicable.
Security Bond The security bond provides protection to Owner if Contractor presents an acceptable guaranteed maximum price (“GMP”) to Owner but is unable to deliver the required payment and performance bonds within the time period stated below.