Security and Monitoring Sample Clauses

Security and Monitoring. 4.1 Trimble agrees to use commercially reasonable technical and organizational measures designed to prevent unauthorized access, use, alteration or disclosure of the Service or Content, please check our Trust Center in our public web (xxxxx://xxx.xxxxx.xxx/tekla-trust-center). However, Trimble shall have no responsibility for errors in transmission, unauthorized third-party access or other causes beyond Xxxxxxx’x control.
AutoNDA by SimpleDocs
Security and Monitoring. 7.1 Client is responsible for determining whether any materials it wishes to transmit using the ONE Mail Direct Service can appropriately be transmitted using that service given the nature and sensitivity of the materials being transmitted. If Client determines that any additional safeguard is required when transmitting such materials, Client will implement such safeguard.
Security and Monitoring. FHLBank Atlanta may implement and maintain security measures (including, without limitation, encryption software and firewalls) designed to prevent security breaches with respect to the Services. FHLBank Atlanta may use tools to monitor the technical performance, availability, security and use of the Services, but the existence or non-existence of such tools, and the use or non-use thereof, will not impose any obligation or liability on FHLBank Atlanta.
Security and Monitoring. Each Member agrees, and undertakes to obtain from time to time such consents and permissions from its Member Agents as may be necessary to ensure, that the LLP may without notice intercept, record and monitor: (a) all communications made by such Member or his Member Agents using the LLP’s information technology or communications systems; and (b) the use by the Member or his Member Agents of the LLP’s information technology systems and network.
Security and Monitoring the Reseller shall maintain such security as is necessary to ensure that it complies with its obligations under this Licence and that the Data and any materials incorporating or derived from the Data are kept secure. The Reseller will use its best endeavours to monitor usage of the Data to ensure compliance with this Licence and to ensure that the Data is not released or used in breach of this Licence.
Security and Monitoring. Each Member agrees that the LLP may without notice intercept, record and monitor: (a) all communications made by him using the LLP’s information technology or communications systems; and (b) his use of the LLP’s information technology systems and network.
Security and Monitoring. Without limiting the Disclaimers set forth in Section 8.3, Contractor will implement reasonable and appropriate measures designed to secure and monitor PPB Content against accidental or unlawful loss, access, or disclosure, including those measures specified in Exhibit II. PPB may identify Content [e.g., medical records subject to HIPAA (the Health Insurance Portability and Accountability Act) and PCI DSS (Payment Card Industry Data Security Standards)] that it reasonably believes requires other or additional security measures. Contractor will take reasonable steps to implement additional security for that Content for an additional fee.
AutoNDA by SimpleDocs
Security and Monitoring 

Related to Security and Monitoring

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Security and Collateral To secure the payment when due of the Notes and all other obligations of the Company under this Agreement or any Rate Hedging Agreement to the Lenders and the Agent, the Company shall execute and deliver, or cause to be executed and delivered, to the Lenders and the Agent Security Documents granting the following:

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Agreements Regarding Collateral and Field Examination Reports (ll) Lien Releases;

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Security Agreements Signed original security agreements, assignments, financing statements and fixture filings (together with collateral in which the Bank requires a possessory security interest), which the Bank requires.

  • Information Regarding Collateral All information supplied to Administrative Agent by or on behalf of any Loan Party with respect to any of the Collateral (in each case taken as a whole with respect to any particular Collateral) is accurate and complete in all material respects.

  • Information Regarding the Collateral (a) Furnish to the Administrative Agent at least thirty (30) days prior written notice of any change in: (i) any Loan Party’s name or in any trade name used to identify it in the conduct of its business or in the ownership of its properties; (ii) the location of any Loan Party’s chief executive office, its principal place of business, any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral owned by it is located (including the establishment of any such new office or facility); (iii) any Loan Party’s organizational structure or jurisdiction of incorporation or formation; or (iv) any Loan Party’s Federal Taxpayer Identification Number or organizational identification number assigned to it by its state of organization. The Loan Parties agree not to effect or permit any change referred to in the preceding sentence unless all filings have been made under the UCC or otherwise that are required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected first priority security interest in all the Collateral for its own benefit and the benefit of the other Credit Parties.

Time is Money Join Law Insider Premium to draft better contracts faster.