Security and Collateral To secure the payment when due of the Notes and all other obligations of the Company under this Agreement or any Rate Hedging Agreement to the Lenders and the Agent, the Company shall execute and deliver, or cause to be executed and delivered, to the Lenders and the Agent Security Documents granting the following:
Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.
Intellectual Property Security Agreement An Intellectual Property Security Agreement executed by Borrower in form and substance reasonably satisfactory to Lender.
Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.
Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.
Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:
Authority and Approval NAP has all requisite limited partnership power and authority to execute and deliver this Agreement, to consummate the transactions contemplated hereby and to perform all of the terms and conditions hereof to be performed by it, except that the consummation of the Merger is subject to receipt of the NAP Written Consent. The execution and delivery of this Agreement by NAP, the consummation of the transactions contemplated hereby and the performance of all of the terms and conditions hereof to be performed by NAP have been duly authorized and approved by all requisite partnership action on the part of NAP, except that the consummation of the Merger is subject to receipt of the NAP Written Consent. At a meeting duly called and held, the NAP Conflicts Committee, by unanimous vote, in good faith (a) determined that this Agreement and the transactions contemplated hereby are in the best interest of NAP and the Holders of NAP Public Units, (b) approved this Agreement and the transactions contemplated hereby, including the Merger (the foregoing constituting the NAP Special Approval), (c) resolved to make the NAP Conflicts Committee Recommendation and (d) resolved to recommend, and to direct the NAP Board to recommend, the approval of this Agreement and the Merger, by the Holders of NAP Public Units. At a meeting duly called and held and upon the receipt of the recommendation of the NAP Conflicts Committee, the NAP Board, by unanimous vote, (i) determined that this Agreement and the transactions contemplated hereby are in the best interests of NAP and the Holders of NAP Public Units, (ii) approved this Agreement and the transactions contemplated hereby, including the Merger, and (iii) directed that this Agreement be submitted to a vote of Holders of NAP Common Units, made the NAP Board Recommendation and authorized the Holders of NAP Common Units to act by written consent pursuant to Section 13.11 and Section 14.3 of the NAP Partnership Agreement. The adoption of this Agreement by the written consent in lieu of a meeting of the Holders of at least a majority of the Outstanding (as defined in the NAP Partnership Agreement) Common Units in accordance with Section 13.11 and Section 14.3 of the NAP Partnership Agreement (the “NAP Written Consent”) is the only vote or approval of partnership interests in NAP necessary to approve and adopt this Agreement and approve and consummate the transactions contemplated by this Agreement, including the Merger. This Agreement has been duly executed and delivered by NAP and constitutes the valid and legally binding obligation of NAP, enforceable against NAP in accordance with its terms, except as such enforcement may be limited by applicable bankruptcy, insolvency, reorganization, moratorium, fraudulent conveyance or other similar Laws affecting the enforcement of creditors’ rights and remedies generally and by general principles of equity (whether applied in a Proceeding at law or in equity).
Authority and Validity He has the capacity and authority to execute, deliver and perform this Agreement and all other agreements and documents he is executing or will execute in connection herewith or therewith.
Purpose and Application The purpose of the Facility is set out below.
RATIFICATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT Borrower hereby ratifies, confirms, and reaffirms, all and singular, the terms and conditions of the IP Agreement and acknowledges, confirms and agrees that the IP Agreement contains an accurate and complete listing of all Intellectual Property.