Integrations Security Sample Clauses

Integrations Security 
AutoNDA by SimpleDocs

Related to Integrations Security

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

  • Obligations Secured The obligations secured hereby are any and all obligations of the Company now existing or hereinafter incurred to the Secured Party, whether oral or written and whether arising before, on or after the date hereof including, without limitation, those obligations of the Company to the Secured Party under this Agreement, the Transaction Documents, and any other amounts now or hereafter owed to the Secured Party by the Company thereunder or hereunder (collectively, the "Obligations").

  • Adding agenda items Any agenda item requiring a decision by the Members must be identified as such on the agenda. Any Member may add an item to the original agenda by written notification to all of the other Members no later than 7 calendar days preceding the meeting.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Additional Items The Insurer shall have received such other documents, instruments, approvals or opinions requested by the Insurer or its counsel as may be reasonably necessary to effect the Transaction, including, but not limited to, evidence satisfactory to the Insurer and its counsel that the conditions precedent, if any, in the Transaction Documents have been satisfied.

  • RECOGNITION AND UNION SECURITY 2.01 The Employer recognizes the Union as the sole collective bargaining agent for the Employees covered by this Agreement. 2.02 The Union recognizes the responsibility of its members to perform their respective duties for the said Employer and at all times to carry out their individual responsibilities according to the regulations, methods and procedures established by the Employer. 2.03 No Employee shall be required to make any written or verbal agreement, which may conflict with the terms of this Collective Agreement. 2.04 The Employer shall deduct by payroll deduction, from every Employee covered by Alberta Labour Relations Board Certificate #375-2000, union dues as levied by the Union. Dues shall be deducted at the end of each pay period and shall be forwarded to the Secretary-Treasurer of the Local Union or to such party as is agreed upon by the Local and the Employer not later than the fifteenth (15th) day of the month following. Dues shall be accompanied by a list containing the names of all Employees from which dues have been deducted, their date of hire, the amount of dues deducted, the regular wage rate or salary, and the classification of each Employee. In the event that dues are forwarded to a party other than the Local Secretary-Treasurer, the Employer shall forward two (2) copies of the list, one to the Local Secretary-Treasurer and one with the dues cheque. 2.05 The Employer will note any Union dues deducted, on T-4 slips issued for Income Tax purposes. (a) The Employer will recognize a Shop Xxxxxxx who is a current Employee of the Complex as having the authority to act on behalf of other Employees. The names of Shop Stewards will be supplied in writing to the Employer before they are recognized as Shop Stewards. (b) Union Officers will be recognized as Shop Stewards for the purpose of this Article. (c) The Employer agrees that the Shop Xxxxxxx shall not be hindered, coerced or interfered with in any way in the performance of the Shop Xxxxxxx’x function while investigating disputes and presenting adjustments. Shop Stewards shall suffer no loss of pay for time spent performing these duties. The Union understands and agrees that each Shop Xxxxxxx is employed to perform work as required by the Employer and that the Shop Xxxxxxx will not leave work during working hours except to perform Shop Xxxxxxx duties as provided in this Collective Agreement. Therefore, no Shop Xxxxxxx shall leave work without obtaining the permission of the Shop Xxxxxxx’x supervisor, and such permission shall not be unreasonably withheld. (d) Shop Stewards shall suffer no loss in pay for time spent on the Employer’s premises in performing their duties as Shop Stewards. 2.07 The Employer respects the fact that the Employees belong to a union, and will not intimidate, coerce, harass, or unduly influence Employees because of union activity.

  • Member's Capital Accounts A Capital Account for the Member shall be maintained by the Company. The Member's Capital Account shall reflect the Member’s capital contributions and increases for any net income or gain of the Company. The Member’s Capital Account shall also reflect decreases for distributions made to the Member and the Member’s share of any losses and deductions of the Company.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!