Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Information Regarding Collateral All information supplied to Administrative Agent by or on behalf of any Loan Party with respect to any of the Collateral (in each case taken as a whole with respect to any particular Collateral) is accurate and complete in all material respects.
Examination of Mortgage Loan Files and Due Diligence Review The Mortgage Loan Seller shall reasonably cooperate with any examination of the Mortgage Files for, and any other documents and records relating to, the Mortgage Loans, that may be undertaken by or on behalf of the Purchaser on or before the Closing Date. The fact that the Purchaser has conducted or has failed to conduct any partial or complete examination of any of the Mortgage Files for, and/or any of such other documents and records relating to, the Mortgage Loans, shall not affect the Purchaser’s right to pursue any remedy available in equity or at law for a breach of the Mortgage Loan Seller’s representations and warranties made pursuant to Section 4, except as expressly set forth in Section 5.