We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Security and Charge 15.1 In consideration of the Supplier agreeing to supply the Goods, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money). 15.2 The Client indemnifies the Supplier from and against all the Supplier’s costs and disbursements including legal costs on a solicitor and own client basis incurred in exercising the Supplier’s rights under this clause. 15.3 The Client irrevocably appoints the Supplier and each director of the Supplier as the Client’s true and lawful attorney/s to perform all necessary acts to give effect to the provisions of this clause 15 including, but not limited to, signing any document on the Client’s behalf.
Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.
Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.
Security Agreements On the Closing Date, (x) Holdings and the Borrower shall have duly authorized, executed and delivered the Security Agreement substantially in the form of Exhibit E (as amended, modified, restated and/or supplemented from time to time, the “Security Agreement”) covering all of Holdings’ and the Borrower’s present and future Collateral referred to therein (including, as applicable, by reference to the Perfection Certificate) (the “Security Agreement Collateral”) and (y) Borrower and Holdings shall have duly authorized, executed and delivered the Perfection Certificate and shall have delivered the following: (i) proper financing statements (Form UCC-1 or the equivalent) authorized for filing under the UCC or other appropriate filing offices of each jurisdiction and, in the case of the Borrower, filings with the United States Patent and Trademark Office and United States Copyright Office, in each case, as may be reasonably necessary or desirable to perfect the security interests purported to be created by the Security Agreement and as set forth on Schedule 6 to the Perfection Certificate; (ii) all stock certificates or Instruments (as defined in the Security Agreement), if any, representing or evidencing the Security Agreement Collateral (to the extent required by the Security Agreement) accompanied by instruments of transfer and stock powers undated and endorsed in blank; and (iii) certified copies, each of a recent date, of (x) requests for information or copies (Form UCC-1), or equivalent reports as of a recent date, listing all effective financing statements that name Holdings or the Borrower as debtor and that are filed in the jurisdictions referred to in clause (i) above, together with copies of such other financing statements that name Holdings or the Borrower as debtor (none of which shall cover any of the Collateral except to the extent evidencing Permitted Liens or to the extent such financing statements will be terminated as contemplated by Section 6.05), (y) United States Patent and Trademark Office and United States Copyright Office searches reasonably requested by the Administrative Agent and (z) reports as of a recent date listing all effective tax and judgment liens with respect to Holdings or the Borrower in each jurisdiction as the Administrative Agent may reasonably require.
Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.
The Security Agreement The security interest granted pursuant to this Trademark Security Agreement is granted in conjunction with the security interest granted to the Collateral Agent pursuant to the Security Agreement and Grantor hereby acknowledges and affirms that the rights and remedies of the Collateral Agent with respect to the security interest in the Trademarks made and granted hereby are more fully set forth in the Security Agreement. In the event that any provision of this Trademark Security Agreement is deemed to conflict with the Security Agreement, the provisions of the Security Agreement shall control unless the Collateral Agent shall otherwise determine.
Other Security and Guaranties The Agent, may, without notice or demand and without affecting the Borrower's obligations hereunder, from time to time: (a) take from any Person and hold collateral (other than the Collateral) for the payment of all or any part of the Obligations and exchange, enforce or release such collateral or any part thereof; and (b) accept and hold any endorsement or guaranty of payment of all or any part of the Obligations and release or substitute any such endorser or guarantor, or any Person who has given any Lien in any other collateral as security for the payment of all or any part of the Obligations, or any other Person in any way obligated to pay all or any part of the Obligations.
Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.
Security and Offset Issuer hereby grants to NCPS and the Indemnified Parties a security interest in and lien upon the Escrow Funds (to the extent of Issuer’s rights thereto) to secure all obligations hereunder, and NCPS and the Indemnified Parties shall have the right to offset the amount of any compensation or reimbursement due any of them hereunder (including any claim for indemnification pursuant to Section 9 hereof) against the Escrow Funds (to the extent of Issuer’s rights thereto.) If for any reason the Escrow Funds available to NCPS and the Indemnified Parties pursuant to such security interest or right of offset are insufficient to cover such compensation and reimbursement, Issuer shall promptly pay such amounts to NCPS and the Indemnified Parties upon receipt of an itemized invoice.
Intellectual Property Security Agreements Duly executed originals of the US Intellectual Property Security Agreement and the European Intellectual Property Security Agreements, each dated the Closing Date and signed by each applicable Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.