Safety appliances; Licenses; Security Systems; Sample Clauses

Safety appliances; Licenses; Security Systems;. The Lessee shall keep the Premises equipped with all safety appliances (including a new fire alarm system to be provided by Lessor) that may be required by any public authority because of any use made by Lessee other than normal office/research and development use. In connection therewith, the Lessee shall and procure all licenses and permits so required because of such use. Further, the Lessee shall do any work required because of such use. It is understood and agreed however, that the foregoing provisions shall not be construed to broaden in any way the Lessee's Permitted Uses. The Lessee shall install, and shall keep and maintain, security systems of high quality to provide security to any and all parts of the premises leased hereunder to the Lessee. Said systems shall be installed and maintained at the sole and exclusive cost to the Lessee.
AutoNDA by SimpleDocs

Related to Safety appliances; Licenses; Security Systems;

  • Security System Landlord shall not be obligated to provide or maintain any security patrol or security system. Landlord shall not be responsible for the quality of any such patrol or system which may be provided hereunder or for damage or injury to Tenant, its employees, invitees or others due to the failure, action or inaction of such patrol or system.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust has determined that the Procedures, as part of the Trust’s overall anti-money laundering program and the Red Flag Identity Theft Prevention program, are reasonably designed to prevent the Fund from being used for money laundering or the financing of terrorist activities and to achieve compliance with the applicable provisions of the Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust:

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Environmental Compliance and Reports Borrower shall comply in all respects with any and all Environmental Laws; not cause or permit to exist, as a result of an intentional or unintentional action or omission on Borrower's part or on the part of any third party, on property owned and/or occupied by Borrower, any environmental activity where damage may result to the environment, unless such environmental activity is pursuant to and in compliance with the conditions of a permit issued by the appropriate federal, state or local governmental authorities; shall furnish to Lender promptly and in any event within thirty (30) days after receipt thereof a copy of any notice, summons, lien, citation, directive, letter or other communication from any governmental agency or instrumentality concerning any intentional or unintentional action or omission on Borrower's part in connection with any environmental activity whether or not there is damage to the environment and/or other natural resources. Additional Assurances. Make, execute and deliver to Lender such promissory notes, mortgages, deeds of trust, security agreements, assignments, financing statements, instruments, documents and other agreements as Lender or its attorneys may reasonably request to evidence and secure the Loans and to perfect all Security Interests.

  • Technology and Intellectual Property (a) Schedule 2.22(a) sets forth a complete and correct list of all (i) registered trademarks, service marks, domain names, copyrights and patents; (ii) applications for registration or grant of any of the foregoing; (iii) unregistered trademarks, service marks, trade names, logos and assumed names; and (iv) licenses for any of the foregoing, in each case, owned by or for the benefit of the Company or a Company Subsidiary, or used in or necessary to conduct the Company’s or a Company Subsidiary’s business as presently conducted. The items on Schedule 2.22(a), together with all other trademarks, service marks, trade names, logos, assumed names, patents, copyrights, trade secrets, computer software, licenses, formulae, customer lists or other databases, business application designs and inventions currently used in or necessary to conduct the businesses of the Company or of a Company Subsidiary, constitute the “Intellectual Property.”

  • Certain Additional Actions Regarding Intellectual Property If any Event of Default shall have occurred and be continuing, upon the written demand of the Collateral Agent, each Pledgor shall execute and deliver to the Collateral Agent an assignment or assignments of the registered Patents, Trademarks and/or Copyrights and Goodwill and such other documents as are necessary or appropriate to carry out the intent and purposes hereof. Within five (5) Business Days of written notice thereafter from the Collateral Agent, each Pledgor shall make available to the Collateral Agent, to the extent within such Pledgor’s power and authority, such personnel in such Pledgor’s employ on the date of the Event of Default as the Collateral Agent may reasonably designate to permit such Pledgor to continue, directly or indirectly, to produce, advertise and sell the products and services sold by such Pledgor under the registered Patents, Trademarks and/or Copyrights, and such persons shall be available to perform their prior functions on the Collateral Agent’s behalf.

  • Information Systems (a) The MA Organization must:

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

Time is Money Join Law Insider Premium to draft better contracts faster.