Replacement Note Upon receipt of evidence reasonably satisfactory to Maker of the loss, theft, destruction or mutilation of this Note, and in the case of any such loss, theft or destruction, upon delivery of an indemnity agreement reasonably satisfactory to Maker or, in the case of any such mutilation, upon surrender and cancellation of this Note, Maker will execute and deliver to Holder in lieu thereof, a replacement note dated as of the date of this Note, identical in form and substance to this Note and upon such execution and delivery all references in the Mortgage to this Note shall be deemed to refer to such replacement note.
Minuted note The working time bank agreement shall supplant the time and other limitations governing the granting of agreed elements of a working time bank unless otherwise agreed.
E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
NOTE For Community-‐Based TLDs Only] Obligations of Registry Operator to TLD Community. Registry Operator shall establish registration policies in conformity with the application submitted with respect to the TLD for: (i) naming conventions within the TLD, (ii) requirements for registration by members of the TLD community, and (iii) use of registered domain names in conformity with the stated purpose of the community-‐based TLD. Registry Operator shall operate the TLD in a manner that allows the TLD community to discuss and participate in the development and modification of policies and practices for the TLD. Registry Operator shall establish procedures for the enforcement of registration policies for the TLD, and resolution of disputes concerning compliance with TLD registration policies, and shall enforce such registration policies. Registry Operator agrees to implement and be bound by the Registry Restrictions Dispute Resolution Procedure as set forth at [insert applicable URL] with respect to disputes arising pursuant to this Section 2.19. Registry Operator shall implement and comply with the community registration policies set forth on Specification 12 attached hereto.]
JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.
Replacement of Note 2.1 In the event that this Note is mutilated, destroyed, lost or stolen, Payor shall, at its sole expense, execute, register and deliver a new Note, in exchange and substitution for this Note, if mutilated, or in lieu of and substitution for this Note, if destroyed, lost or stolen. In the case of destruction, loss or theft, Payee shall furnish to Payor indemnity reasonably satisfactory to Payor, and in any such case, and in the case of mutilation, Payee shall also furnish to Payor evidence to its reasonable satisfaction of the mutilation, destruction, loss or theft of this Note and of the ownership thereof. Any replacement Note so issued shall be in the same outstanding principal amount as this Note and dated the date to which interest shall have been paid on this Note or, if no interest shall have yet been paid, dated the date of this Note. 2.2 Every Note issued pursuant to the provisions of Section 2.1 above in substitution for this Note shall constitute an additional contractual obligation of the Payor, whether or not this Note shall be found at any time or be enforceable by anyone.
Supplier Note Thank you for the opportunity
Term Note The Term Loan shall be evidenced by the Term Note. At the time of the disbursement of the Term Loan or a repayment made in whole or in part thereon, a notation thereof shall be made on the books and records of the Bank. All amounts recorded shall be, absent demonstrable error, conclusive and binding evidence of (i) the principal amount of the Term Loan advanced hereunder, (ii) any accrued and unpaid interest owing on the Term Loan and (iii) all amounts repaid on the Term Loan. The failure to record any such amount or any error in recording such amounts shall not, however, limit or otherwise affect the joint and several obligations of the Borrowers under the Term Note to repay the principal amount of the Term Loan, together with all interest accruing thereon.
Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.