Security and Data Taxes Sample Clauses

Security and Data Taxes. Section 4.1 Security and Data Privacy. (a) Buyer's Security. Buyer will implement reasonable and appropriate measures designed to secure access to: (i) any device associated with Buyer and utilized in connection with Xxxxx's purchase of LetCoinShop Tokens; (ii) private keys to Buyer's wallet or account; (iii) any other username, passwords or other login or identifying credentials. In the event that Buyer is no longer in possession of Xxxxx's private keys or any device associated with Xxxxx's account or is not able to provide Xxxxx's login or identifying credentials, Buyer may lose all of Xxxxx's LetCoinShop Tokens and/or access to Buyer's account. Company is under no obligation to recover any LetCoinShop Tokens and Xxxxx acknowledges, understands and agrees that all purchases of LetCoinShop Tokens are non-refundable and Buyer will not receive money or other compensation for any LetCoinShop Tokens are purchased. More details you may find in ARTICLE 7 herein.
AutoNDA by SimpleDocs
Security and Data Taxes. 4.1. Security and Data Privacy. a. Contributors Security. Contributor will implement reasonable and appropriate measures designed to secure access to: (i) any device associated with Contributor and utilized in connection with Contributors contribution of XDCE Tokens; (ii) private keys to Contributors wallet or account; and (iii) any other username, passwords or other login or identifying credentials. In the event that Contributor is no longer in possession of Contributor’s private keys or any device associated with Contributor’s account or is not able to provide Contributor’s login or identifying credentials, Contributor may lose all of Contributor’s XDCE Tokens and/or access to Contributor’s account. Company is under no obligation to recover any XDCE Tokens and Contributor acknowledges, understands and agrees that all contributions of XDCE Tokens are non-refundable and Contributor will not receive money or other compensation for any XDCE Tokens acquired through contribution. Additional Information. Upon Company’s request, Contributor will immediately provide to Company information and documents that Company, in its sole discretion, deems necessary or appropriate to comply with any laws, regulations, rules or agreements, including without limitation judicial process. Such documents include, but are not limited to, passport, driver’s license, utility bills, photographs of associated individuals, government identification cards, or sworn statements. Contributor consents to Company disclosing such information and documents in order to comply with applicable laws, regulations, rules or agreements. Contributor acknowledges that Company may refuse to distribute XDCE Tokens to Contributor until such requested information is provided.
Security and Data Taxes. Section 4.1 Security and Data Privacy.
Security and Data Taxes. 4.1. Security and Data Privacy. a. Donor's Security. Donor will implement reasonable and appropriate measures designed to secure access to: (i) any device associated with Donor and utilized in connection with Donor's purchase of ClearTOKENs; (ii) private keys to Donor's wallet or account; and (iii) any other username, passwords or other login or identifying credentials. In the event that Donor is no longer in possession of Donor's private keys or any device associated with Donor's account or is not able to provide Donor's login or identifying credentials, Donor may lose all of Donor's ClearTOKENs and/or access to Donor's account. Donor is under no obligation to recover any ClearTOKENs and Donor acknowledges, understands and agrees that all purchases of 6 ClearTOKENs are non-refundable and Donor will not receive money or other compensation for any ClearTOKENs purchased.
Security and Data Taxes. 4.1. Security and Data Privacy. 4.1.1. a. Buyer’s Security. Buyer will implement reasonable and appropriate measures designed to secure access to: (i) any device associated with Buyer and utilized in connection with Buyer’s purchase of CLEAR Tokens; (ii) private keys to Buyer’s wallet or account; and (iii) any other username, passwords or other login or identifying credentials. In the event that Buyer is no longer in possession of Buyer’s private keys or any device associated with Buyer’s account or is not able to provide Buyer’s login or identifying credentials, Buyer may lose all of Buyer’s CLEAR Tokens and/or access to Buyer’s account. Company is under no obligation to recover any CLEAR Tokens and Buyer acknowledges, understands and agrees that all purchases of 6 CLEAR Tokens are non-refundable and Buyer will not receive money or other compensation for any CLEAR Tokens purchased.
Security and Data Taxes a. Buyer’s Security. Buyer will implement reasonable and appropriate measures designed to secure access to: (i) any device associated with Buyer and utilized in connection with Buyer’s purchase of RCR Tokens; (ii) private keys to Buyer’s wallet or account; and (iii) any other username, passwords or other login or identifying credentials. In the event that Buyer is no longer in possession of Buyer’s private keys or any device associated with Buyer’s account or is not able to provide Buyer’s login or identifying credentials, Buyer may lose all of Buyer’s RCR Tokens and/or access to Buyer’s account. Company is under no obligation to recover any RCR Tokens and Buyer acknowledges, understands and agrees that all purchases of RCR Tokens are nonrefundable and Buyer will not receive money or other compensation for any RCR Tokens purchased.
Security and Data Taxes 
AutoNDA by SimpleDocs

Related to Security and Data Taxes

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Security and Charge 15.1 In consideration of the Supplier agreeing to supply the Goods, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money). 15.2 The Client indemnifies the Supplier from and against all the Supplier’s costs and disbursements including legal costs on a solicitor and own client basis incurred in exercising the Supplier’s rights under this clause. 15.3 The Client irrevocably appoints the Supplier and each director of the Supplier as the Client’s true and lawful attorney/s to perform all necessary acts to give effect to the provisions of this clause 15 including, but not limited to, signing any document on the Client’s behalf.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Intellectual Property Security Agreements Duly executed originals of Trademark Security Agreements, Copyright Security Agreements and Patent Security Agreements, each dated the Closing Date and signed by each Credit Party which owns Trademarks, Copyrights and/or Patents, as applicable, all in form and substance reasonably satisfactory to Agent, together with all instruments, documents and agreements executed pursuant thereto.

  • Information Regarding the Collateral (a) Furnish to the Administrative Agent at least fifteen (15) days (or such shorter period as the Administrative Agent may agree) prior written notice of any change in: (i) any Loan Party’s legal name; (ii) the location of any Loan Party’s chief executive office, its principal place of business, any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral owned by it is located (including the establishment of any such new office or facility, but excluding in-transit Collateral); (iii) any Loan Party’s organizational structure or jurisdiction of incorporation or formation; or (iv) any Loan Party’s Federal Taxpayer Identification Number or organizational identification number assigned to it by its state of organization. The Loan Parties shall not effect or permit any change referred to in the preceding sentence unless the Loan Parties have undertaken all such action, if any, reasonably requested by the Administrative Agent under the UCC or otherwise that is required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected first priority security interest in all the Collateral for its own benefit and the benefit of the other Credit Parties. (b) From time to time as may be reasonably requested by the Administrative Agent, the Lead Borrower shall supplement each Schedule hereto, or any representation herein or in any other Loan Document, with respect to any matter arising after the Restatement Effective Date that is required to be set forth or described in such Schedule or as an exception to such representation or that is necessary to correct any information in such Schedule or representation which has been rendered inaccurate thereby (and, in the case of any supplements to any Schedule, such Schedule shall be appropriately marked to show the changes made therein). Notwithstanding the foregoing, no supplement or revision to any Schedule or representation shall be deemed the Credit Parties’ consent to the matters reflected in such updated Schedules or revised representations nor permit the Loan Parties to undertake any actions otherwise prohibited hereunder or fail to undertake any action required hereunder from the restrictions and requirements in existence prior to the delivery of such updated Schedules or such revision of a representation; nor shall any such supplement or revision to any Schedule or representation be deemed the Credit Parties’ waiver of any Default resulting from the matters disclosed therein.

  • Amendments to Security Agreement (a) Section 1 of the Security Agreement is hereby amended by adding the following definitions in the appropriate alphabetical order to such Section:

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!