E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.
Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.
Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.
Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.
FURNISHED PROPERTY (a) LOCKHEED XXXXXX may, by written authorization, provide to SELLER property owned by either LOCKHEED XXXXXX or its customer (Furnished Property). Furnished Property shall be used only for the performance of this Contract.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.
Premises Security 10.1 Security of premises and control of access.
Transfer of the Property or a Beneficial Interest in Borrower For purposes of this Section 19 only, “Interest in the Property” means any legal or beneficial interest in the Property, including, but not limited to, those beneficial interests transferred in a bond for deed, contract for deed, installment sales contract, or escrow agreement, the intent of which is the transfer of title by Borrower to a purchaser at a future date. If all or any part of the Property or any Interest in the Property is sold or transferred (or if Borrower is not a natural person and a beneficial interest in Borrower is sold or transferred) without Xxxxxx’s prior written consent, Lender may require immediate payment in full of all sums secured by this Security Instrument. However, Lender will not exercise this option if such exercise is prohibited by Applicable Law. If Lender exercises this option, Lender will give Borrower notice of acceleration. The notice will provide a period of not less than 30 days from the date the notice is given in accordance with Section 16 within which Borrower must pay all sums secured by this Security Instrument. If Xxxxxxxx fails to pay these sums prior to, or upon, the expiration of this period, Lender may invoke any remedies permitted by this Security Instrument without further notice or demand on Borrower and will be entitled to collect all expenses incurred in pursuing such remedies, including, but not limited to: (a) reasonable attorneys’ fees and costs; (b) property inspection and valuation fees; and (c) other fees incurred to protect Xxxxxx’s Interest in the Property and/or rights under this Security Instrument.
Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.
User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.