Security and Surety to cover Third Parties Sample Clauses

Security and Surety to cover Third Parties. Acting as guarantors and/or surety with regard to third-party Debts, including those of Subsidiaries and Related Entities.
AutoNDA by SimpleDocs

Related to Security and Surety to cover Third Parties

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • LIABILITY AND INSURANCE 7.1 Workers’ Compensation Insurance. The Contractor shall maintain workers’ compensation insurance as required under the Florida Workers’ Compensation Law or the workers’ compensation law of another jurisdiction where applicable. The Contractor must require all subcontractors to similarly provide workers’ compensation insurance for all of the latter’s employees. In the event work is being performed by the Contractor under the Contract and any class of employees performing the work is not protected under Workers’ Compensation statutes, the Contractor must provide, and cause each subcontractor to provide, adequate insurance satisfactory to the Department, for the protection of employees not otherwise protected.

  • Public Liability and Property Damage Insurance A. During the term of this Agreement, Contractor shall at all times maintain, at its expense, the following coverages and requirements. The comprehensive general liability insurance shall include broad form property damage insurance.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • LIABILITY, INDEMNITY AND INSURANCE 9.1.1 Nothing in this Contract shall be construed to limit or exclude either Party's liability for:-

  • Indemnity and Insurance 24.1 The Contractor shall indemnify the Authority against all claims, damages and any other liabilities which may arise as a result, directly of the performance or purported performance of this Contract, the aggregate liability not to exceed [£5.000.000], except to the extent that any injury, loss or damage is caused by the negligence, wilful misconduct or breach of the Contract by Authority Personnel

  • Certification Regarding Lobbying Applicable to Grants Subgrants, Cooperative Agreements, and Contracts Exceeding $100,000 in Federal Funds Submission of this certification is a prerequisite for making or entering into this transaction and is imposed by section 1352, Title 31, U.S. Code. This certification is a material representation of fact upon which reliance was placed when this transaction was made or entered into. Any person who fails to file the required certification shall be subject to a civil penalty of not less than $10,000 and not more than $100,000 for each such failure. The undersigned certifies, to the best of his or her knowledge and belief, that: (1) No Federal appropriated funds have been paid or will be paid by or on behalf of the undersigned, to any person for influencing or attempting to influence an officer or employee of any agency, a Member of Congress, an officer or employee of congress, or an employee of a Member of Congress in connection with the awarding of a Federal contract, the making of a Federal grant, the making of a Federal loan, the entering into a cooperative agreement, and the extension, continuation, renewal, amendment, or modification of a Federal contract, grant, loan, or cooperative agreement. (2) If any funds other than Federal appropriated funds have been paid or will be paid to any person for influencing or attempting to influence an officer or employee of any agency, a Member of Congress, an officer or employee of congress, or an employee of a Member of Congress in connection with this Federal grant or cooperative agreement, the undersigned shall complete and submit Standard Form-LLL, “disclosure Form to Report Lobbying,” in accordance with its instructions. (3) The undersigned shall require that the language of this certification be included in the award documents for all covered subawards exceeding $100,000 in Federal funds at all appropriate tiers and that all subrecipients shall certify and disclose accordingly. I HAVE NOT Lobbied per above If you answered "I HAVE lobbied" to the above Attribute Question If you answered "I HAVE lobbied" to the above Attribute question, you must download the Lobbying Report "Standard From LLL, disclosure Form to Report Lobbying" which includes instruction on completing the form, complete and submit it in the Response Attachments section as a report of the lobbying activities you performed or paid others to perform. Subcontracting with Small and Minority Businesses, Women's Business Enterprises, and Labor Surplus Area Firms. Do you ever anticipate the possibility of subcontracting any of your work under this award if you are successful? IF NO, DO NOT ANSWER THE NEXT ATTRIBUTE QUESTION. . IF YES, and ONLY IF YES, you must answer the next question YES if you want a TIPS Member to be authorized to spend Federal Grant Funds for Procurement. NO

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

Time is Money Join Law Insider Premium to draft better contracts faster.