RESORT TO SECURITY Sample Clauses

RESORT TO SECURITY. To resort to and realize upon the security hereunder and any other security now or hereafter held by Beneficiary in such order and manner as Trustee and Beneficiary, or either of them, may in their sole discretion determine. Resort to any or all such security may be taken concurrently or successively and in one or several consolidated or independent judicial actions or lawfully taken non-judicial proceedings, or both.
AutoNDA by SimpleDocs
RESORT TO SECURITY. Mortgagee may resort to any security given by this Mortgage or to any other security now existing or hereafter given to secure the payment of the Obligations, in whole or in part, and in such portions and in such order as may seem best to Mortgagee in its sole and uncontrolled discretion, and any such action shall not in any way be considered as a waiver of any of the rights, benefits, liens or security interests evidenced by this Mortgage.
RESORT TO SECURITY. Lender may resort to any security given by this Mortgage or to any other security now existing or hereafter given to secure the payment of the Secured Indebtedness, in whole or in part, and in such portions and in such order as may seem best to Lender in its sole and uncontrolled discretion, and any such action shall not in any way be considered as a waiver of any of the rights, benefits, liens or security interests evidenced by this Mortgage.
RESORT TO SECURITY. Beneficiary may resort to any security given by this Deed of Trust or to any other security now existing or hereafter given to secure the payment of the Obligations, in whole or in part, and in such portions and in such order as may seem best to Beneficiary in its sole and uncontrolled discretion, and any such action shall not in any way be considered as a waiver of any of the rights, benefits, liens or security interests evidenced by this Deed of Trust.

Related to RESORT TO SECURITY

  • Release of and Resort to Collateral Mortgagee may release, regardless of consideration and without the necessity for any notice to or consent by the holder of any subordinate lien on the Mortgaged Property, any part of the Mortgaged Property without, as to the remainder, in any way impairing, affecting, subordinating or releasing the lien or security interest created in or evidenced by the Loan Documents or their status as a first and prior lien and security interest in and to the Mortgaged Property. For payment of the Indebtedness, Mortgagee may resort to any other security in such order and manner as Mortgagee may elect.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Right to Seek Assurances The Transfer Agent reserves the right to refuse to transfer or redeem Shares until it is satisfied that the requested transfer or redemption is legally authorized, and it shall incur no liability for the refusal, in good faith, to make transfers or redemptions that the Transfer Agent, in its judgment, deems improper or unauthorized, or until it is satisfied that there is no basis for any claims adverse to such transfer or redemption. The Transfer Agent may, in effecting transfers, rely upon the provisions of the Uniform Act for the Simplification of Fiduciary Security Transfers or the Uniform Commercial Code, as the same may be amended from time to time, which in the opinion of legal counsel for the Company or of the Transfer Agent's own legal counsel protect the Transfer Agent in not requiring certain documents in connection with the transfer or redemption of Shares of the Fund, and the Fund shall indemnify the Transfer Agent for any acts done or omitted by it in reliance upon such laws or opinions of counsel to the Fund or of its own counsel.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Delivery and Control of Security Collateral (a) All certificates or instruments representing or evidencing Security Collateral shall be delivered to and held by or on behalf of the Collateral Agent pursuant hereto and shall be in suitable form for transfer by delivery, or shall be accompanied by duly executed instruments of transfer or assignment in blank, all in form and substance satisfactory to the Collateral Agent. The Collateral Agent shall have the right at any time to exchange certificates or instruments representing or evidencing Security Collateral for certificates or instruments of smaller or larger denominations.

  • Release of Security Interest The financial institution named below hereby relinquishes any and all right, title, interest, lien or claim of any kind it may have in all mortgage loans described on the attached Schedule A (the “Mortgage Loans”) to be purchased by Xxxxxx Xxxxxxx Mortgage Capital Inc. from the company named on the next page pursuant to that certain Second Amended and Restated Mortgage Loan Sale and Servicing Agreement, dated as of July 1, 2006 and certifies that all notes, mortgages, assignments and other documents in its possession relating to such Mortgage Loans have been delivered and released to the Company or its designees, as of the date and time of the sale of such Mortgage Loans to Xxxxxx Xxxxxxx Mortgage Capital Inc. Such release shall be effective automatically without any further action by any party upon payment in one or more installments, in immediately available funds, of $_____________, in accordance with the wire instructions set forth below. Name, Address and Wire Instructions of Financial Institution ________________________________ (Name) ________________________________ (Address) ________________________________ ________________________________ ________________________________ By:_____________________________

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

Time is Money Join Law Insider Premium to draft better contracts faster.