SECURITY AND PARTIAL RECOURSE Sample Clauses

SECURITY AND PARTIAL RECOURSE. The Borrower's obligations under this Note shall be secured by a first-priority security interest in all of the Shares. The Shares shall be pledged pursuant to a Stock Pledge Agreement to be executed by the Borrower, all terms of which are incorporated herein by this reference. Regardless of any realization from collateral that may secure the Borrower's obligations under this Note, the Borrower shall remain personally liable only for an amount equal to Forty (40%) Percent of the original principal amount of the Note, plus 40% of any interest accrued and unpaid on such original principal amount. The Company shall have recourse, to the extent described above, to any and all other assets of the Borrower, in addition to any Shares pledged pursuant to the Stock Pledge Agreement, to satisfy the Borrower's obligations hereunder.
AutoNDA by SimpleDocs

Related to SECURITY AND PARTIAL RECOURSE

  • Filing of Certificate and Perfection of Limited Partnership The General Partner shall execute, acknowledge, record and file at the expense of the Partnership, any and all amendments to the Certificate(s) and all requisite fictitious name statements and notices in such places and jurisdictions as may be necessary to cause the Partnership to be treated as a limited partnership under, and otherwise to comply with, the laws of each state or other jurisdiction in which the Partnership conducts business.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • DESCRIPTION OF COLLATERAL AND GUARANTIES Repayment of the Indebtedness is secured by the Collateral as described in the Loan Agreement. Hereinafter, the above-described security documents and guaranties, together with all other documents securing repayment of the Indebtedness shall be referred to as the "Security Documents". Hereinafter, the Security Documents, together with all other documents evidencing or securing the Indebtedness shall be referred to as the "Existing Loan Documents".

  • Creation, Perfection and Priority of Liens The execution and delivery of the Collateral Documents by Loan Parties and Sponsors, together with (i) the actions taken on or prior to the date hereof pursuant to subsections 4.1, 4.2, 6.8 and 6.9 and (ii) the delivery to Administrative Agent of any Pledged Collateral not delivered to Administrative Agent at the time of execution and delivery of the applicable Collateral Document (all of which Pledged Collateral has been so delivered) are effective to create in favor of Administrative Agent for the benefit of Lenders, as security for the respective Secured Obligations (as defined in the applicable Collateral Document in respect of any Collateral), a valid and perfected First Priority Lien on all of the Collateral, and all filings and other actions necessary or desirable to perfect and maintain the perfection and First Priority status of such Liens have been duly made or taken and remain in full force and effect, other than the filing of any UCC financing statements or Mortgages delivered to Administrative Agent for filing or recording, as applicable (but not yet filed or recorded) and the periodic filing of UCC continuation statements in respect of UCC financing statements filed by or on behalf of Administrative Agent.

  • Other Security and Guaranties The Agent, may, without notice or demand and without affecting the Borrower's obligations hereunder, from time to time: (a) take from any Person and hold collateral (other than the Collateral) for the payment of all or any part of the Obligations and exchange, enforce or release such collateral or any part thereof; and (b) accept and hold any endorsement or guaranty of payment of all or any part of the Obligations and release or substitute any such endorser or guarantor, or any Person who has given any Lien in any other collateral as security for the payment of all or any part of the Obligations, or any other Person in any way obligated to pay all or any part of the Obligations.

  • Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.

  • Possession and Use of Collateral Subject to the provisions of the Security Documents, the Issuer and the Guarantors shall have the right to remain in possession and retain exclusive control of and to exercise all rights with respect to the Collateral (other than monies or U.S. government obligations deposited pursuant to Article VIII, and other than as set forth in the Security Documents and this Indenture), to operate, manage, develop, lease, use, consume and enjoy the Collateral (other than monies and U.S. government obligations deposited pursuant to Article VIII and other than as set forth in the Security Documents and this Indenture), to alter or repair any Collateral so long as such alterations and repairs do not impair the creation or perfection of the Lien of the Security Documents thereon, and to collect, receive, use, invest and dispose of the reversions, remainders, interest, rents, lease payments, issues, profits, revenues, proceeds and other income thereof.

  • Perfection and Priority of Liens Receipt by the Administrative Agent of the following: (i) searches of Uniform Commercial Code filings and tax and judgment liens in the jurisdiction of formation of each Loan Party and each other jurisdiction reasonably required by the Administrative Agent, disclosing no Liens other than Permitted Liens; (ii) UCC financing statements for each appropriate jurisdiction as is necessary, in the Administrative Agent’s discretion, to perfect the Administrative Agent’s security interest in the Collateral; (iii) all certificates evidencing any certificated Equity Interests pledged to the Administrative Agent pursuant to the Security Agreement, together with duly executed in blank and undated stock powers attached thereto; (iv) searches of ownership of, and Liens on, United States registered intellectual property of each Loan Party in the appropriate governmental offices, disclosing no Liens other than (A) Permitted Liens and (B) Liens to be released on the Initial Borrowing Date; and (v) duly executed notices of grant of security interest in substantially the form required by the Security Agreement as are necessary, in the Administrative Agent’s sole discretion, to perfect the Administrative Agent’s security interest in the United States registered intellectual property of the Loan Parties; provided that, to the extent any Collateral is not or cannot be provided and/or perfected on the Initial Borrowing Date (other than the pledge and perfection of the security interests in the Equity Interests of the Parent’s material, wholly owned Domestic Subsidiaries (except with respect to certificated Equity Interests in the Target and its Subsidiaries, which shall be delivered with duly executed in blank and undated stock powers attached thereto not later than 2 Business Days after the Initial Borrowing Date) and assets with respect to which a lien may be perfected by the filing of a UCC financing statement) after the Loan Parties’ use of commercially reasonable efforts to do so, then the delivery of such Collateral and/or the perfection of a security interest in such Collateral shall not constitute a condition precedent to the availability of the Comdata Facilities on the Initial Borrowing Date but instead shall be delivered and/or perfected within thirty (30) days after the Initial Borrowing Date (or such longer period as the Administrative Agent agrees in its sole discretion).

  • Grant of Security and Secured Obligations SECTION 2.1. Pledge; Grant of Security Interest 6 SECTION 2.2. Secured Obligations 7 SECTION 2.3. Security Interest 7

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!