Security, Access and Use Sample Clauses

Security, Access and Use. Quinyx will maintain a level of security for the Service and the Solutions that is in accordance with: industry practice, applicable Data Protection Laws (including putting in place reasonable administrative, physical, technical, organisational and other security measures to protect against unauthorized access to, or loss, destruction, unavailability or alteration of any Customer Data processed or stored by the Service) and the Information Security Overview. Quinyx may update the Information Security Overview from time to time, provided however, that any changes will not degrade the information security policies and procedures in place. Quinyx warrants that it has and will maintain, for the duration of the Agreement, ISO/IEC 27001 certification or equivalent. As far as Quinyx is reasonably aware, the Service does not contain any Viruses.
AutoNDA by SimpleDocs
Security, Access and Use. (a) Except as otherwise set forth in the Services Schedule, each Party shall be responsible for all health, safety and security at its facilities and for its systems, which security shall be comparable to security provided to its own businesses and functions; provided, however, that neither Party makes any representation or warranty that such security will ensure compliance with any Law or reach any desired or intended result. Each Party has the right to monitor and reasonably audit, in accordance with the terms and conditions of this Agreement, the other Party’s compliance with such systems and security procedures. At all times when a Party is accessing the facilities, systems, equipment, computers, software, network or files owned or controlled by the other Party pursuant to this Agreement, such Party shall, and shall cause its Affiliates and Representatives to, use commercially reasonable efforts to comply with the policies and procedures of the other Party concerning health, safety and security, to the extent such policies and procedures are communicated to such Party in advance.
Security, Access and Use. Quinyx will maintain a comprehensive information security program consistent with industry standards and the Quinyx Information Security Standard Policies and Procedures that contains appropriate administrative, technical, physical, organizational and other security safeguards reasonably designed to protect Personal Information from unauthorized disclosure, loss, destruction, unavailability or alteration. Such information security program will include business continuity and disaster recovery plans that are consistent with industry standards and are designed to protect against loss of Customer Content. In the event that Quinyx has reason to believe that there has been any unauthorized access to, or loss of, Personal Information from its systems or premises, then it will promptly notify Customer according to its policies and protocols Quinyx aligned with the data type and nature of the event.

Related to Security, Access and Use

  • Collateral Access Agreements Such Grantor shall use commercially reasonable efforts to obtain a Collateral Access Agreement, from the lessor of each leased property, mortgagee of owned property or bailee or consignee with respect to the operator of any warehouse, processor or converter facility or other location (each of which is identified on Exhibit B hereto), where Collateral in excess of $1,000,000 is stored or located at any given time (other than (i) company-owned facilities and (ii) retail stores), which agreement or letter shall provide access rights, contain a waiver or subordination of all Liens or claims that the landlord, mortgagee, bailee or consignee may assert against the Collateral at that location, and shall otherwise be reasonably satisfactory in form and substance to the Administrative Agent. With respect to such locations or warehouse space leased as of the Effective Date and thereafter where Collateral in excess of $1,000,000 is stored or located (other than (i) company-owned facilities and (ii) retail stores), if the Administrative Agent has not received a Collateral Access Agreement as of the Effective Date (or, if later as of the date such location is acquired or leased), the Borrower’s Eligible Inventory at that location shall be subject to such Reserves as may be established by the Administrative Agent. After the Effective Date, no real property or warehouse space shall be leased by such Grantor (other than retail stores) and no Inventory shall be shipped to a processor or converter under arrangements established after the Effective Date, unless and until a satisfactory Collateral Access Agreement shall first have been obtained with respect to such location or if it has not been obtained, the Borrower’s Eligible Inventory at that location shall be subject to the establishment of Reserves acceptable to the Administrative Agent. Such Grantor shall timely and fully pay and perform its obligations under all leases and other agreements with respect to each leased location or third party warehouse where any Collateral is or may be located.

  • ACCESS AND NOTICE 10 4.4 APPROVALS OF THIRD PARTIES AND PERMITS AND CONSENTS . . . . . . . . . . . 10 4.5

  • Location of the Collateral Except in the ordinary course of Grantor's business, Grantor agrees to keep the Collateral (or to the extent the Collateral consists of intangible property such as accounts or general intangibles, the records concerning the Collateral) at Grantor's address shown above or at such other locations as are acceptable to Lender. Upon Lender's request, Grantor will deliver to Lender in form satisfactory to Lender a schedule of real properties and Collateral locations relating to Grantor's operations, including without limitation the following: (1) all real property Grantor owns or is purchasing; (2) all real property Grantor is renting or leasing; (3) all storage facilities Grantor owns, rents, leases, or uses; and (4) all other properties where Collateral is or may be located.

  • Possession and Use of Collateral Subject to the provisions of the Security Documents, the Issuer and the Guarantors shall have the right to remain in possession and retain exclusive control of and to exercise all rights with respect to the Collateral (other than monies or U.S. government obligations deposited pursuant to Article VIII, and other than as set forth in the Security Documents and this Indenture), to operate, manage, develop, lease, use, consume and enjoy the Collateral (other than monies and U.S. government obligations deposited pursuant to Article VIII and other than as set forth in the Security Documents and this Indenture), to alter or repair any Collateral so long as such alterations and repairs do not impair the creation or perfection of the Lien of the Security Documents thereon, and to collect, receive, use, invest and dispose of the reversions, remainders, interest, rents, lease payments, issues, profits, revenues, proceeds and other income thereof.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Possession and Use Contractor may possess, use and reproduce Confidential Information solely for the Purpose. Contractor shall not use the Confidential Information for any other purpose.

  • Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.

  • Landlord Waivers; Collateral Access Agreements At any time any Collateral with a book value in excess of $250,000 (when aggregated with all other Collateral at the same location) is located on any real property of a Loan Party located in the United States (whether such real property is now existing or acquired after the Effective Date) which is not owned by a Loan Party, or is stored on the premises of a bailee, warehouseman, or similar party, use its best efforts to obtain written subordinations or waivers or collateral access agreements, as the case may be, in form and substance satisfactory to the Collateral Agent.

  • Preservation of the Collateral Secured Party may, but is not required to, take such actions from time to time as Secured Party reasonably deems appropriate to maintain or protect the Collateral. Secured Party shall have exercised reasonable care in the custody and preservation of the Collateral if Secured Party takes such action as Grantor shall reasonably request in writing which is not inconsistent with Secured Party's status as a secured party, but the failure of Secured Party to comply with any such request shall not be deemed a failure to exercise reasonable care; provided, however, Secured Party's responsibility for the safekeeping of the Collateral shall (i) be deemed reasonable if such Collateral is accorded treatment substantially equal to that which Secured Party accords its own property, and (ii) not extend to matters beyond the control of Secured Party, including acts of God, war, insurrection, riot or governmental actions. In addition, any failure of Secured Party to preserve or protect any rights with respect to the Collateral against prior or third parties, or to do any act with respect to preservation of the Collateral, not so requested by Grantor, shall not be deemed a failure to exercise reasonable care in the custody or preservation of the Collateral. Grantor shall have the sole responsibility for taking such action as may be necessary, from time to time, to preserve all rights of Grantor and Secured Party in the applicable Collateral against prior or third parties. Without limiting the generality of the foregoing, where Collateral consists in whole or in part of Capital Securities, Grantor represents to, and covenants with, Secured Party that Grantor has made arrangements for keeping informed of changes or potential changes affecting the Capital Securities (including rights to convert or subscribe, payment of dividends, reorganization or other exchanges, tender offers and voting rights), and Grantor agrees that Secured Party shall have no responsibility or liability for informing Grantor of any such or other changes or potential changes or for taking any action or omitting to take any action with respect thereto.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

Time is Money Join Law Insider Premium to draft better contracts faster.