First priority of application Sample Clauses

First priority of application. The Company shall Appropriate the Asset Allocation towards the Reduction of the applicable Distribution Liabilities, based on the Value of such Asset Allocation and the amount of such Distribution Liabilities as at the relevant Distribution Value Date, in the following order of priority:
AutoNDA by SimpleDocs
First priority of application. The Company shall Appropriate any part of the Asset Allocation that comprises Derived Assets towards the Reduction of the Affected Intermediary Derived Asset Liability relating to that Asset Allocation, based on the Value of the component of such Asset Allocation that comprises Derived Assets and the amount of the Affected Intermediary Derived Asset Liability as at the relevant Distribution Value Date.
First priority of application. The Company shall first Appropriate such Asset Shortfall Claim towards the Reduction of Net Financial Liability or, if a Collateralisation Election has been made, first, the Uncollateralised Net Financial Liability and, secondly, the Collateralised Net Financial Liability in that order, in each case, based on the Value of the Asset Shortfall Claim and the amount of such Net Financial Liability or the Uncollateralised Net Financial Liability and the Collateralised Net Financial Liability, as the case may be, as at the relevant Distribution Value Date.

Related to First priority of application

  • PRIORITY OF USE Any schedule or milestone in this Agreement is estimated based upon the Parties' current understanding of the projected availability of NASA goods, services, facilities, or equipment. In the event that NASA's projected availability changes, Partner shall be given reasonable notice of that change, so that the schedule and milestones may be adjusted accordingly. The Parties agree that NASA's use of the goods, services, facilities, or equipment shall have priority over the use planned in this Agreement. Should a conflict arise, NASA in its sole discretion shall determine whether to exercise that priority. Likewise, should a conflict arise as between two or more non-NASA Partners, NASA, in its sole discretion, shall determine the priority as between those Partners. This Agreement does not obligate NASA to seek alternative government property or services under the jurisdiction of NASA at other locations.

  • Priority of Agreement In the event of any conflict between provisions of this Agreement or any amendment hereto and any documents executed, acknowledged, sworn to, or filed by any Manager under this power of attorney, this Agreement and its amendments shall govern.

  • Priority of Agreements This DPA shall govern the treatment of Student Data in order to comply with the privacy protections, including those found in FERPA and all applicable privacy statutes identified in this DPA. In the event there is conflict between the terms of the DPA and the Service Agreement, Terms of Service, Privacy Policies, or with any other bid/RFP, license agreement, or writing, the terms of this DPA shall apply and take precedence. In the event of a conflict between Exhibit H, the SDPC Standard Clauses, and/or the Supplemental State Terms, Exhibit H will control, followed by the Supplemental State Terms. Except as described in this paragraph herein, all other provisions of the Service Agreement shall remain in effect.

  • Security Interest This Agreement creates a valid and continuing security interest (as defined in the UCC) in the Receivables in favor of the Issuer, which security interest is prior to all other Liens, and is enforceable as such against creditors of and purchasers from the Seller.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Priority of Documents The documents forming the Contract are to be taken as mutually explanatory of one another. For the purposes of interpretation, the priority of the documents shall be in accordance with the following sequence:

  • Composition and Priority The Contractor agrees to provide commodities or contractual services to the Customer as specified in the Contract. Additionally, the terms of the Contract supersede the terms of all prior agreements between the Parties on this subject matter.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Scope of Application Except as otherwise provided in this Agreement, the dispute settlement provisions of this Chapter shall apply with respect to the settlement of all disputes between the Parties regarding the interpretation or application of this Agreement, whenever a Party considers that the other Party has failed to carry out its obligations under this Agreement.

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

Time is Money Join Law Insider Premium to draft better contracts faster.