Security and Conduct Sample Clauses

Security and Conduct. 9.1. At all times during the Term, Contractor shall provide the Services and use all resources related thereto, in a secure manner and in accordance with the security requirements set forth herein or otherwise mandated by law or GTA policies, including the prevention and detection of fraud, abuse, or other inappropriate use or access of systems and networks by all appropriate means, including network management and maintenance applications and tools, and the use of appropriate encryption technologies. GTA shall be advised immediately in the event that any security breach or any fraud, abuse, or other inappropriate use or access of systems and networks by inappropriate means occurs.
AutoNDA by SimpleDocs
Security and Conduct. Landlord is not required to maintain or hire security for the Demised Premises. It is the sole obligation of Tenant to provide security for Members, its customers and employees and any other invitees of tenant at tenant’s own expense and tenant is obligated to indemnify Landlord from and against any and all claims arising from tenant’s failure to provide security. Landlord shall have the right from time to time to establish, modify, and enforce reasonable rules, regulations, and a Code of Conduct with respect to the Leased Premises and its use by Resident Members, Non-Resident Members, and the Public. Tenant shall comply with Landlord's rules and regulations, if any, respecting the management, care and safety of the Demised Premises. A copy of such rules, regulations, and Code of Conduct will be given to Tenant. WITNESSES: LANDLORD: TIMBERLANE COUNTRY CLUB Xxxxx Xxxxxxx, President TENANT: CAFÉ HOME, INC. STATE OF LOUISIANA PARISHOF JEFFERSON On this day of , 2019, before me, the undersigned authority, personally came and appeared: Timberlane Country Club, a Louisiana corporation, herein represented by Xxxxx Xxxxxxx, its President, duly authorized by a vote of shareholders at a meeting held on , a copy of which is attached hereto, who declared and acknowledged to me that he executed the foregoing instrument and signed the same for the purpose and objects therein expressed.
Security and Conduct. At all times during the Term, Contractor shall provide the Services and use all resources related thereto, in a secure manner and in accordance with the security requirements set forth herein or otherwise mandated by law or GTA policies, including the prevention and detection of fraud, abuse, or other inappropriate use or access of systems and networks by all appropriate means, including network management and maintenance applications and tools, and the use of appropriate encryption technologies. GTA or the State Entity shall be advised immediately in the event that any security breach or any fraud, abuse, or other inappropriate use or access of systems and networks by inappropriate means occurs. Contractor shall comply, and shall require its personnel and subcontractors’ personnel to comply, with all applicable laws, rules and regulations, as well as State and GTA policies and standards in effect during the performance of this Agreement, including (without limitation) GTA’s reasonable confidentiality requirements, GTA’s policies, standards and procedures regarding data access, security, personnel conduct, safety and ethics, including spoken directives of GTA facility staff. In the event that any of Contractor’s or a subcontractor’s personnel do not comply with such requirements, GTA, in its sole reasonable discretion, may have the personnel’s access revoked and/or have such personnel removed from the premises. If GTA believes that the performance or conduct of any person employed or retained by Contractor to perform any Services hereunder is unsatisfactory for any reason or is not in compliance with the provisions of this Agreement, GTA shall so notify Contractor in writing and Contractor shall promptly address the performance or conduct of such person, or, at GTA’s request, immediately replace such person with another person acceptable to GTA and with sufficient knowledge, skill, training and expertise to perform the Services in accordance with this Agreement.
Security and Conduct 

Related to Security and Conduct

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Integrity and Confidentiality Escrow Agent will be required to (i) hold and maintain the Deposits in a secure, locked, and environmentally safe facility, which is accessible only to authorized representatives of Escrow Agent, (ii) protect the integrity and confidentiality of the Deposits using commercially reasonable measures and (iii) keep and safeguard each Deposit for one (1) year. ICANN and Registry Operator will be provided the right to inspect Escrow Agent’s applicable records upon reasonable prior notice and during normal business hours. Registry Operator and ICANN will be provided with the right to designate a third-­‐party auditor to audit Escrow Agent’s compliance with the technical specifications and maintenance requirements of this Specification 2 from time to time. If Escrow Agent receives a subpoena or any other order from a court or other judicial tribunal pertaining to the disclosure or release of the Deposits, Escrow Agent will promptly notify the Registry Operator and ICANN unless prohibited by law. After notifying the Registry Operator and ICANN, Escrow Agent shall allow sufficient time for Registry Operator or ICANN to challenge any such order, which shall be the responsibility of Registry Operator or ICANN; provided, however, that Escrow Agent does not waive its rights to present its position with respect to any such order. Escrow Agent will cooperate with the Registry Operator or ICANN to support efforts to quash or limit any subpoena, at such party’s expense. Any party requesting additional assistance shall pay Escrow Agent’s standard charges or as quoted upon submission of a detailed request.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Use, Security, and Retention Local Agency shall use, hold and maintain State Confidential Information in compliance with any and all applicable laws and regulations in facilities located within the United States, and shall maintain a secure environment that ensures confidentiality of all State Confidential Information wherever located. Local Agency shall provide the State with access, subject to Local Agency’s reasonable security requirements, for purposes of inspecting and monitoring access and use of State Confidential Information and evaluating security control effectiveness. Upon the expiration or termination of this Agreement, Local Agency shall return State Records provided to Local Agency or destroy such State Records and certify to the State that it has done so, as directed by the State. If Local Agency is prevented by law or regulation from returning or destroying State Confidential Information, Local Agency warrants it will guarantee the confidentiality of, and cease to use, such State Confidential Information.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Publicity and Confidentiality 12.1 Publicity. Partner will keep confidential and will not disclose, market or advertise to third parties the terms of this Agreement (including the fees paid hereunder). Partner or Red Hat may reference its relationship with the other, in the normal course of business including during earnings calls, discussions with analysts, meetings with the press, customer briefings, general marketing activities and in regulatory filings. Neither Party will issue formal press releases or other similar activities referencing the other Party without the written consent of the other Party.

Time is Money Join Law Insider Premium to draft better contracts faster.