Delivery of Certificated Securities Collateral Each Pledgor represents and warrants that all certificates, agreements or instruments representing or evidencing the Securities Collateral in existence on the date hereof have been delivered to the Collateral Agent in suitable form for transfer by delivery or accompanied by duly executed instruments of transfer or assignment in blank and that the Collateral Agent has a perfected first priority security interest therein. Each Pledgor hereby agrees that all certificates, agreements or instruments representing or evidencing Securities Collateral acquired by such Pledgor after the date hereof shall promptly (but in any event within five days after receipt thereof by such Pledgor) be delivered to and held by or on behalf of the Collateral Agent pursuant hereto. All certificated Securities Collateral shall be in suitable form for transfer by delivery or shall be accompanied by duly executed instruments of transfer or assignment in blank, all in form and substance satisfactory to the Collateral Agent. The Collateral Agent shall have the right, at any time upon the occurrence and during the continuance of any Event of Default, to endorse, assign or otherwise transfer to or to register in the name of the Collateral Agent or any of its nominees or endorse for negotiation any or all of the Securities Collateral, without any indication that such Securities Collateral is subject to the security interest hereunder. In addition, upon the occurrence and during the continuance of an Event of Default, the Collateral Agent shall have the right at any time to exchange certificates representing or evidencing Securities Collateral for certificates of smaller or larger denominations.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.
Removal of Collateral Grantor shall keep the Collateral (or to the extent the Collateral consists of intangible property such as accounts, the records concerning the Collateral) at Grantor's address shown above, or at such other locations as are acceptable to Lender. Except in the ordinary course of its business, including the sales of inventory, Grantor shall not remove the Collateral from its existing locations without the prior written consent of Lender. To the extent that the Collateral consists of vehicles, or other titled property, Grantor shall not take or permit any action which would require application for certificates of title for the vehicles outside the State of California, without the prior written consent of Lender.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
Perfection of Uncertificated Securities Collateral Each Pledgor represents and warrants that the Collateral Agent has a perfected First Priority security interest in all uncertificated Pledged Securities (other than uncertificated Pledged Securities in which a security interest cannot be perfected by taking all applicable actions under the UCC and such other actions (including, without limitation, the delivery or filing of financing, statements, agreements instruments or other documents) as may have been reasonably requested by the Collateral Agent in order to perfect such security interest under the local laws of the jurisdiction of the issuer of such Pledged Securities) pledged by it hereunder that are in existence on the date hereof. Each Pledgor hereby agrees that if any of the Pledged Securities are at any time not evidenced by certificates of ownership, then each applicable Pledgor shall, to the extent permitted by applicable law, (i) cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) the issuer to execute and deliver to the Collateral Agent an acknowledgment of the pledge of such Pledged Securities substantially in the form of Exhibit 1 hereto or such other form that is reasonably satisfactory to the Collateral Agent, (ii) if necessary or desirable to perfect a security interest in such Pledged Securities, cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) the issuer of such uncertificated Pledged Securities to enter into a control agreement with the Collateral Agent and such Pledgor reasonably satisfactory to the Collateral Agent pursuant to which such issuer shall agree to comply with instructions originated by the Collateral Agent without further consent by such Pledgor, and cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) such pledge to be recorded on the equityholder register or the books of the issuer, execute any customary pledge forms or other documents necessary or appropriate to complete the pledge and give the Collateral Agent the right to transfer such Pledged Securities under the terms hereof, (iii) upon request by the Collateral Agent, provide to the Collateral Agent an opinion of counsel, in form and substance reasonably satisfactory to the Collateral Agent, confirming such pledge and perfection thereof, and (iv) after the occurrence and during the continuance of any Event of Default, upon request by the Collateral Agent, (A) cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) the Organizational Documents of each such issuer that is a Subsidiary of a Pledgor to be amended to provide that such Pledged Securities shall be treated as “securities” for purposes of the UCC and (B) cause (or in the case of Pledged Securities issued by an issuer that is not a Wholly Owned Subsidiary, use commercially reasonable efforts to cause) such Pledged Securities to become certificated and delivered to the Collateral Agent in accordance with the provisions of Section 3.1.
SECURITIES SYSTEMS The Custodian may deposit and/or maintain securities owned by a Portfolio in a U.S. Securities System in compliance with the conditions of Rule 17f-4 under the 1940 Act, as amended from time to time.
Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.
STUDENT DATA Contractor acknowledges that student data is protected by both federal and state law. See Wis. Stat. § 118.125; 20 U.S.C. § 1232g(b); 34 C.F.R. § 99.1
Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Certification Regarding Prohibition of Boycotting Israel (Tex. Gov. Code 2271) 5 Certification Regarding Prohibition of Contracts with Certain Foreign-Owned Companies (Tex. Gov. 5 Code 2274) 5 Certification Regarding Prohibition of Discrimination Against Firearm and Ammunition Industries (Tex.
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.