Building Security Landlord may restrict access to and from the Premises and the Building outside of the ordinary business hours of the Building. Landlord may require identification of persons entering and leaving the Building during this period and, for this purpose, may issue Building passes to tenants of the Building.
Continuing Security This Security is a continuing security and will extend to the ultimate balance of the Secured Liabilities, regardless of any intermediate payment or discharge in whole or in part.
Holding Securities The Custodian shall identify on its books as belonging to the Portfolios the foreign securities held by each Foreign Sub-Custodian or Foreign Securities System. The Custodian may hold foreign securities for all of its customers, including the Portfolios, with any Foreign Sub-Custodian in an account that is identified as belonging to the Custodian for the benefit of its customers, provided however, that (i) the records of the Custodian with respect to foreign securities of the Portfolios which are maintained in such account shall identify those securities as belonging to the Portfolios and (ii), to the extent permitted and customary in the market in which the account is maintained, the Custodian shall require that securities so held by the Foreign Sub-Custodian be held separately from any assets of such Foreign Sub-Custodian or of other customers of such Foreign Sub-Custodian.
Continuing Security Interest; Transfer of Notes This Security Agreement shall create a continuing security interest in the Collateral and shall (a) remain in full force and effect until payment in full in cash of all Secured Obligations, the termination or expiration of all Letters of Credit and the termination of all Commitments, (b) be binding upon the Grantor, its successors, transferees and assigns, and (c) inure, together with the rights and remedies of the Collateral Agent hereunder, to the benefit of the Collateral Agent and each other Secured Party. Without limiting the generality of the foregoing clause (c), any Lender may assign or otherwise transfer (in whole or in part) any Note or Credit Extension held by it to any other Person or entity, and such other Person or entity shall thereupon become vested with all the rights and benefits in respect thereof granted to such Lender under any Loan Document (including this Security Agreement) or otherwise, subject, however, to any contrary provisions in such assignment or transfer, and to the provisions of Article XIII of the Credit Agreement. Upon the payment in full in cash of all Secured Obligations, the termination or expiration of all Letters of Credit and the termination of all Commitments, the security interest granted herein shall terminate and all rights to the Collateral shall revert to the Grantor. Upon any such termination, the Collateral Agent will, at the Grantor's sole expense, execute and deliver to the Grantor such documents as the Grantor shall reasonably request to evidence such termination. Upon any sale or other transfer of Collateral permitted by the terms of the Credit Agreement, the security interest created hereunder in such Collateral (but not in the proceeds thereof) shall be deemed to be automatically released and the Collateral Agent will, at the Grantor's sole expense, execute and deliver to the Grantor such documents as the Grantor shall reasonably request to evidence such release.
Continuing Security Interest This Agreement shall create a continuing security interest in the Pledged Property and shall: (i) remain in full force and effect until payment in full of the Obligations; and (ii) be binding upon the Company and its successors and heirs and (iii) inure to the benefit of the Secured Party and its successors and assigns. Upon the payment or satisfaction in full of the Obligations, the Company shall be entitled to the return, at its expense, of such of the Pledged Property as shall not have been sold in accordance with Section 5.2 hereof or otherwise applied pursuant to the terms hereof.
Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS. 18.2 A Tender Securing Declaration shall use the form included in Section IV, Tendering Forms. 18.3 If a Tender Security is specified pursuant to ITT 18.1, the Tender Security shall be a demand guarantee in any of the following forms at the Tenderer option: i) cash; ii) a bank guarantee; iii) a guarantee by an insurance company registered and licensed by the Insurance Regulatory Authority listed by the Authority; or
E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »
Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.