High Priority Problems Sample Clauses

High Priority Problems. Both Parties shall address High Priority Errors as Severity 1 Errors in accordance with Exhibit B-2, CNN may contact the First Level Escalation Contact if the High Priority Problem is not Fixed or a Workaround is not implemented within the target response times set forth in Exhibit B-2. If a High Priority Error is not Fixed or a Workaround is not implemented within one (1) hour after contacting the First Level Escalation Contact, the Second Level Escalation Contact may be contacted. If the High Priority Error is not Fixed or a Workaround is not implemented within two (2) hours after contacting the Second Level Escalation Contact, then the Third Level Escalation Contact may be contacted. If either Party’s Escalation Contact has been contacted by the other Party, they may contact the corresponding Escalation Contact.
AutoNDA by SimpleDocs

Related to High Priority Problems

  • Lien Sharing and Priority Confirmation Each Holder, by accepting a Note, and the Trustee hereby agrees that:

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Rights in Collateral; Priority of Liens Borrower and each other Loan Party own the property granted by it as Collateral under the Collateral Documents, free and clear of any and all Liens in favor of third parties. Upon the proper filing of UCC financing statements, and the taking of the other actions required by Lender, the Liens granted pursuant to the Collateral Documents will constitute valid and enforceable first, prior and perfected (to the extent that Liens on the Collateral can be perfected by the filing of UCC financing statements) Liens on the Collateral in favor of Lender.

  • Priority of Documents If any of the documents referenced in Section 2(c) are inconsistent, this Agreement shall prevail over the Exhibits, the Schedules and additional incorporated documents.

  • Lien Documents At Closing and thereafter as Lender deems necessary, Borrower shall execute and/or deliver to Lender, or have executed and delivered (all in form and substance satisfactory to Lender and its counsel):

  • Removal of Collateral Grantor shall keep the Collateral (or to the extent the Collateral consists of intangible property such as accounts, the records concerning the Collateral) at Grantor's address shown above, or at such other locations as are acceptable to Lender. Except in the ordinary course of its business, including the sales of inventory, Grantor shall not remove the Collateral from its existing locations without the prior written consent of Lender. To the extent that the Collateral consists of vehicles, or other titled property, Grantor shall not take or permit any action which would require application for certificates of title for the vehicles outside the State of California, without the prior written consent of Lender.

  • Secured Party Control Bank, Secured Party, Servicer and Company each agree that Bank will comply with instructions given to Bank by Secured Party directing disposition of funds in the Collateral Accounts (“Disposition Instructions”) without further consent by Company or Servicer. Except as otherwise required by law, Bank will not agree with any third party to comply with instructions for disposition of funds in the Collateral Accounts originated by such third party.

  • Perfected First Priority Liens (a) This Agreement is effective to create, as collateral security for the Obligations of such Grantor, valid and enforceable Liens on such Grantor’s Security Collateral in favor of the Collateral Agent for the benefit of the Secured Parties, except as to enforcement, as may be limited by applicable domestic or foreign bankruptcy, insolvency, fraudulent conveyance, reorganization, moratorium and other similar laws relating to or affecting creditors’ rights’ generally, general equitable principles (whether considered in a proceeding in equity or at law) and an implied covenant of good faith and fair dealing.

Time is Money Join Law Insider Premium to draft better contracts faster.