Existing Security System Sample Clauses

Existing Security System. Landlord acknowledges that Tenant is purchasing from the existing tenant in the Premises the existing electronic security access and control system (“Existing Security System”) within the Premises installed by the existing tenant. Tenant shall furnish Landlord with a copy of all key codes or access cards and Tenant shall ensure that Landlord shall have access to the Premises at all times. Additionally, Tenant shall ensure that the Existing Security System shall comply with all Laws, including all fire safety laws, and in no event shall Landlord be liable for, and Tenant shall defend, indemnify, and hold harmless Landlord and its representatives and agents from any claims, demands, liabilities, causes of action, suits, judgments, damages and expenses arising from, the Existing Security System or the malfunctioning thereof in accordance with Tenant’s indemnity contained in Section 11.4 hereof. Sections 8 and 21 of this Lease shall govern the maintenance and Landlord’s removal rights with respect to the Existing Security System. LANDLORD AND TENANT EXPRESSLY DISCLAIM ANY IMPLIED WARRANTY THAT THE PREMISES ARE SUITABLE FOR TENANT’S INTENDED COMMERCIAL PURPOSE, AND TENANT’S OBLIGATION TO PAY RENT HEREUNDER IS NOT DEPENDENT UPON THE CONDITION OF THE PREMISES OR THE PERFORMANCE BY LANDLORD OF ITS OBLIGATIONS HEREUNDER, AND, EXCEPT AS OTHERWISE EXPRESSLY PROVIDED HEREIN, TENANT SHALL CONTINUE TO PAY THE RENT, WITHOUT ABATEMENT, DEMAND, SETOFF OR DEDUCTION, NOTWITHSTANDING ANY BREACH BY LANDLORD OF ITS DUTIES OR OBLIGATIONS HEREUNDER, WHETHER EXPRESS OR IMPLIED. This Lease is executed as of the Lease Date (as defined in the Basic Lease Information). LANDLORD: RIATA HOLDINGS, L.P., a Delaware limited partnership By: Riata Holdings General Partner, LLC, a Delaware limited liability company doing business in Texas as Riata Austin Holdings General Partner, LLC, its general partner By: /s/ Xxxx X. Xxxxxx TENANT: VERACYTE, INC., a Delaware corporation By: /s/ Xxxx X. Spring Name: Xxxx X. Spring Title: CFO
AutoNDA by SimpleDocs

Related to Existing Security System

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.04, the parties acknowledge that the Direct Registration System (“DRS”) and Profile Modification System (“Profile”) shall apply to uncertificated American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC pursuant to which the Depositary may register the ownership of uncertificated American Depositary Shares, which ownership shall be evidenced by periodic statements issued by the Depositary to the Owners entitled thereto. Profile is a required feature of DRS which allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register such transfer. (b) In connection with and in accordance with the arrangements and procedures relating to DRS/Profile, the parties understand that the Depositary will not verify, determine or otherwise ascertain that the DTC participant which is claiming to be acting on behalf of an Owner in requesting a registration of transfer and delivery as described in subsection (a) has the actual authority to act on behalf of the Owner (notwithstanding any requirements under the Uniform Commercial Code). For the avoidance of doubt, the provisions of Sections 5.03 and 5.08 shall apply to the matters arising from the use of the DRS. The parties agree that the Depositary’s reliance on and compliance with instructions received by the Depositary through the DRS/Profile System and in accordance with this Deposit Agreement shall not constitute negligence or bad faith on the part of the Depositary.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Secondary Systems The Developer and Connecting Transmission Owner shall each cooperate with the other in the inspection, maintenance, and testing of control or power circuits that operate below 600 volts, AC or DC, including, but not limited to, any hardware, control or protective devices, cables, conductors, electric raceways, secondary equipment panels, transducers, batteries, chargers, and voltage and current transformers that directly affect the operation of Developer or Connecting Transmission Owner’s facilities and equipment which may reasonably be expected to impact the other Party. The Developer and Connecting Transmission Owner shall each provide advance notice to the other Party, and to NYISO, before undertaking any work on such circuits, especially on electrical circuits involving circuit breaker trip and close contacts, current transformers, or potential transformers.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Software Ownership If Contractor develops or pays to have developed computer software exclusively with funds or proceeds from the Contract to perform its obligations under the Contract, or to perform computerized tasks that it was not previously performing to meet its obligations under the Contract, the computer software shall be exclusively owned by or licensed to the Department. If Contractor develops or pays to have developed computer software which is an addition to existing software owned by or licensed exclusively with funds or proceeds from the Contract, or to modify software to perform computerized tasks in a manner different than previously performed, to meet its obligations under the Contract, the addition shall be exclusively owned by or licensed to the Department. In the case of software owned by the Department, the Department grants to Contractor a nontransferable, nonexclusive license to use the software in the performance of the Contract. In the case of software licensed to the Department, the Department grants to Contractor permission to use the software in the performance of the Contract. This license or permission, as the case may be, terminates when Contractor has completed its work under the Contract. If Contractor uses computer software licensed to it which it does not modify or program to handle the specific tasks required by the Contract, then to the extent allowed by the license agreement between Contractor and the owner of the software, Contractor grants to the Department a continuing, nonexclusive license for either the Department or a different contractor to use the software in order to perform work substantially identical to the work performed by Contractor under the Contract. If Contractor cannot grant the license as required by this section, then Contractor shall reveal the input screens, report formats, data structures, linkages, and relations used in performing its obligations under the contract in such a manner to allow the Department or another contractor to continue the work performed by contractor under the Contract.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!