Other Security Issues Sample Clauses

Other Security Issues. Never leave your computer unattended when you are signed on to Online Banking Online Banking. Sign off of Online Banking Online Banking as soon as you are finished. Close your browser after signing off of Online Banking.
AutoNDA by SimpleDocs
Other Security Issues. Never leave your computer unattended when you are signed on. Sign off as soon as you are finished. It is your obligation to provide timely correct Deposits and Entry information. We send Entries to the processor for settlement once Transmitted, provided we receive the Deposits and are able to authenticate by our four (4) o’clock p.m. processing deadlines on a Business Day. We reserve the right to change the schedule from time to time with or without such notice to you, including, but not limited to, holidays. We may treat Deposits that we receive after a deadline as if received on the next Business Day.
Other Security Issues. 1. No Party shall deploy mines anywhere in Kosovo. The Parties shall provide the KVM with all information in their possession as to the location of existing minefields to, facilitate humanitarian demining efforts.
Other Security Issues. As long as the on board systems and networks are dedicated to specific applications and are stand-alone, the only way to access them is locally on board the ship and normally only in controlled areas of the ship. With the progress of new technologies and in particular in networking, the systems now tend to be connected to or reside as part of a larger restricted network on the ship. This trend can be expected to continue with even more systems being connected to the restricted network and new links from the restricted network to shore. Also, increasing levels of complexity and less crew on-board make more owners delegate the maintenance and management of networks and applications to third parties or to the manufacturers themselves. Consequently, systems that used to be stand alone and isolated inside the ship are now network based and are connected through the Internet to the shore. This opens up possibilities for hostile attacks, e.g. from hackers, but it also causes potential safety problems with regards to misunderstandings or bad decisions inside the owner’s office or by other parties that have legal access to the systems. Furthermore, ship systems and networks are normally not constructed by one party alone. On most ships, there is no IT department that manages network equipment and connections and the systems have in many cases been delivered and commissioned by different parties during the ship’s building process. During the life time of the ship, systems and networks will be upgraded and exchanged several times. This adds to the problem of maintaining the complete network infrastructure. A virus or other mal-xxxx in the office is a great problem, on a ship it may lead to a serious accident. On the other hand, developments on shore with respect to centralization and virtualization may also be implemented on ships. However, this causes new problems. Safety principles and also general business processes are currently based on each supplier having full responsibility for the delivery, including network, computers and software. With more distributed or integrated systems, this principle has to change and this will require updates in business practices as well as in rules and legislation. For the owner and yard it will also present new problems in terms of guarantees and maintenance.

Related to Other Security Issues

  • Collateral The Collateral for this Note includes the Funding Agreement and the Guarantee specified on the face hereof.

  • Security Interest This Agreement creates a valid and continuing security interest (as defined in the UCC) in the Receivables in favor of the Issuer, which security interest is prior to all other Liens, and is enforceable as such against creditors of and purchasers from the Seller.

  • Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.

  • Security Instruments (i) The Administrative Agent shall fail to have an Acceptable Security Interest in any portion of the Collateral or (ii) any Security Instrument shall at any time and for any reason cease to create the Lien on the Property purported to be subject to such agreement in accordance with the terms of such agreement, or cease to be in full force and effect, or shall be contested by the Borrower, any Guarantor or any of their respective Subsidiaries;

  • Use of Proceeds of the Grant Section 3.01. The Recipient shall cause the proceeds of the Grant to be applied to the financing of expenditures on the Project in accordance with the provisions of this Grant Agreement.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Collateral Agent (a) The Trustee and each of the Holders by acceptance of the Notes hereby designates and appoints the Collateral Agent as its agent under this Indenture, the Collateral Documents and the Intercreditor Agreements and the Trustee and each of the Holders by acceptance of the Notes hereby irrevocably authorizes the Collateral Agent to take such action on its behalf under the provisions of this Indenture, the Collateral Documents and the Intercreditor Agreements and to exercise such powers and perform such duties as are expressly delegated to the Collateral Agent by the terms of this Indenture, the Collateral Documents and the Intercreditor Agreements, and consents and agrees to the terms of the Intercreditor Agreements and each Collateral Document, as the same may be in effect or may be amended, restated, supplemented or otherwise modified from time to time in accordance with their respective terms. The Collateral Agent agrees to act as such on the express conditions contained in this Section 12.9. The provisions of this Section 12.9 are solely for the benefit of the Collateral Agent and none of the Trustee, any of the Holders nor any of the Grantors shall have any rights as a third party beneficiary of any of the provisions contained herein other than as expressly provided in Section 12.4. Each Holder agrees that any action taken by the Collateral Agent in accordance with the provision of this Indenture, the Intercreditor Agreements and the Collateral Documents, and the exercise by the Collateral Agent of any rights or remedies set forth herein and therein shall be authorized and binding upon all Holders. Notwithstanding any provision to the contrary contained elsewhere in this Indenture, the Collateral Documents and the Intercreditor Agreements, the duties of the Collateral Agent shall be ministerial and administrative in nature, and the Collateral Agent shall not have any duties or responsibilities, except those expressly set forth herein and in the other Notes Documents to which the Collateral Agent is a party, nor shall the Collateral Agent have or be deemed to have any trust or other fiduciary relationship with the Trustee, any Holder or any Grantor, and no implied covenants, functions, responsibilities, duties, obligations or liabilities shall be read into this Indenture, the Collateral Documents and the Intercreditor Agreements or otherwise exist against the Collateral Agent. Without limiting the generality of the foregoing sentence, the use of the term “agent” in this Indenture with reference to the Collateral Agent is not intended to connote any fiduciary or other implied (or express) obligations arising under agency doctrine of any applicable law. Instead, such term is used merely as a matter of market custom, and is intended to create or reflect only an administrative relationship between independent contracting parties.

  • No Security Interest Holders shall have no security interest in any of the Company’s assets or other collateral. Nothing in this Revenue Sharing Agreement or in the Notes, express or implied, shall be construed to constitute a security interest under the Uniform Commercial Code or similar legislation, now in eRect or hereafler enacted and made effective, in any jurisdiction.

  • Security Interest Absolute All rights of the Secured Party and all Obligations of the Company hereunder, shall be absolute and unconditional, irrespective of: (a) any lack of validity or enforceability of this Agreement, the Notes, the Warrants or any agreement entered into in connection with the foregoing, or any portion hereof or thereof; (b) any change in the time, manner or place of payment or performance of, or in any other term of, all or any of the Obligations, or any other amendment or waiver of or any consent to any departure from the Notes, the Warrants or any other agreement entered into in connection with the foregoing; (c) any exchange, release or nonperfection of any of the Intellectual Property, or any release or amendment or waiver of or consent to departure from any other Intellectual Property for, or any guaranty, or any other security, for all or any of the Obligations; (d) any action by the Secured Party to obtain, adjust, settle and cancel in its sole discretion any insurance claims or matters made or arising in connection with the Intellectual Property; or (e) any other circumstance which might otherwise constitute any legal or equitable defense available to the Company, or a discharge of all or any part of the Security Interest granted hereby. Until the Obligations shall have been paid and performed in full, the rights of the Secured Party shall continue even if the Obligations are barred for any reason, including, without limitation, the running of the statute of limitations or bankruptcy. The Company expressly waives presentment, protest, notice of protest, demand, notice of nonpayment and demand for performance. In the event that at any time any transfer of any Intellectual Property or any payment received by the Secured Party hereunder shall be deemed by final order of a court of competent jurisdiction to have been a voidable preference or fraudulent conveyance under the bankruptcy or insolvency laws of the United States, or shall be deemed to be otherwise due to any party other than the Secured Party, then, in any such event, the Company's obligations hereunder shall survive cancellation of this Agreement, and shall not be discharged or satisfied by any prior payment thereof and/or cancellation of this Agreement, but shall remain a valid and binding obligation enforceable in accordance with the terms and provisions hereof. The Company waives all right to require the Secured Party to proceed against any other person or to apply any Intellectual Property which the Secured Party may hold at any time, or to marshal assets, or to pursue any other remedy. The Company waives any defense arising by reason of the application of the statute of limitations to any obligation secured hereby.

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

Time is Money Join Law Insider Premium to draft better contracts faster.