Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.
Relation to Other Security Documents The provisions of this Agreement shall be read and construed with the other Loan Documents referred to below in the manner so indicated.
Adjustments for Dividends in Stock or Other Securities or Property If while this Warrant, or any portion hereof, remains outstanding and unexpired, the holders of any class of securities as to which purchase rights under this Warrant exist at the time shall have received, or, on or after the record date fixed for the determination of eligible stockholders, shall have become entitled to receive, without payment therefor, other or additional stock or other securities or property (other than cash) of the Company by way of dividend, then and in each case, this Warrant shall represent the right to acquire, in addition to the number of shares of such class of security receivable upon exercise of this Warrant, and without payment of any additional consideration therefor, the amount of such other or additional stock or other securities or property (other than cash) of the Company that such holder would hold on the date of such exercise had it been the holder of record of the class of security receivable upon exercise of this Warrant on the date hereof and had thereafter, during the period from the date hereof to and including the date of such exercise, retained such shares and/or all other additional stock available by it as aforesaid during said period, giving effect to all adjustments called for during such period by the provisions of this Section 4.
Performance by Secured Party If Debtor fails to perform any agreement or obligation provided herein, Secured Party may itself perform, or cause performance of, such agreement or obligation, and the expenses of Secured Party incurred in connection therewith shall be a part of the Indebtedness, secured by the Collateral and payable by Debtor on demand.
Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »
Performance Bond Unless otherwise prohibited by law, the Department may require the Contractor to furnish, without additional cost to the Department, a performance bond or irrevocable letter of credit or other form of security for the satisfactory performance of work hereunder. The Department shall determine the type and amount of security.
Grant Security Grant Bank a security interest in any of Borrower’s assets. Negotiate Items. Negotiate or discount all drafts, trade acceptances, promissory notes, or other indebtedness in which Borrower has an interest and receive cash or otherwise use the proceeds.
User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.
No Other Securities Except for (a) the conversion privileges of the Series A Preferred Shares, the Series B Preferred Shares, the Series C Preferred Shares, the Series D1 Preferred Shares, the Series E Preferred Shares, the Series E1 Preferred Shares and the Series F Preferred Shares, (b) certain rights provided in the Charter Documents of the Company as currently in effect, (c) certain rights provided in the Memorandum and Articles, the Shareholders Agreement, and the Right of First Refusal and Co-Sale Agreement from and after the Closing, and (d) the outstanding Equity Securities set forth in Section 3.2(i) of the Disclosure Schedule, (1) there are no and at the Closing there shall be no other authorized or outstanding Equity Securities of any Group Company; (2) no Equity Securities of any Group Company are subject to any preemptive rights, rights of first refusal (except to the extent provided by applicable PRC Laws) or other rights to purchase such Equity Securities or any other rights with respect to such Equity Securities, and (3) no Group Company is a party or subject to any Contract that affects or relates to the voting or giving of written consents with respect to, or the right to cause the redemption, or repurchase of, any Equity Security of such Group Company. Except as set forth in the Shareholders Agreement (from and after the Closing), the Company has not granted any registration rights or information rights to any other Person, nor is the Company obliged to list, any of the Equity Securities of any Group Companies on any securities exchange. Except as contemplated under the Transaction Documents, there are no voting or similar agreements which relate to the share capital or registered capital of any Group Company.
Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.