Security Card System Sample Clauses

Security Card System. Tenant shall continue to have the right to operate, at its sole cost, expense and risk, Tenant’s own security card system for the Premises. Tenant shall provide Landlord with a card key for emergency access to the Premises.
AutoNDA by SimpleDocs
Security Card System. Subject to the consent of Overlandlord, Subtenant shall be permitted, at Subtenant’s own cost and expense, to install a proximity card reader system in the Subleased Premises.
Security Card System. Tenant shall have the right to interface with -------------------- Landlord's current security card system with its current system's capability. Tenant shall be responsible with the cost associated with the interfacing above and beyond normal card access and any repairs associated with Tenant's use of the system.
Security Card System. Intentionally deleted.

Related to Security Card System

  • Security System Landlord shall not be obligated to provide or maintain any security patrol or security system. Landlord shall not be responsible for the quality of any such patrol or system which may be provided hereunder or for damage or injury to Tenant, its employees, invitees or others due to the failure, action or inaction of such patrol or system.

  • Deposit Accounts; Credit Card Processors Open new DDAs (other than Excluded DDAs and Retail DDAs) unless the Loan Parties shall have delivered to the Agent appropriate Blocked Account Agreements consistent with the provisions of Section 6.12 and otherwise satisfactory to the Agent. No Loan Party shall maintain any bank accounts or enter into any agreements with Credit Card Issuers or Credit Card Processors other than the ones expressly contemplated herein or in Section 6.12 hereof.

  • Cash Management System Each Borrower shall, and shall cause its Subsidiaries to, establish and maintain the Cash Management Systems described below:

  • Deposit Accounts; Credit Card Arrangements (a) Annexed hereto as Schedule 5.21(a) is a list of all DDAs maintained by the Loan Parties as of the Closing Date, which Schedule includes, with respect to each DDA (i) the name and address of the depository; (ii) the account number(s) maintained with such depository; (iii) a contact person at such depository, and (iv) the identification of each Blocked Account Bank.

  • Cash Management Systems On or prior to the Closing Date, Borrowers will establish and will maintain until the Termination Date, the cash management systems described in Annex C (the “Cash Management Systems”).

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Merchant (i) is a corporation duly organized, validly existing and in good standing under the laws of the state of its incorporation; (ii) has all requisite corporate power and authority to own, lease and operate its assets and properties and to carry on its business as presently conducted; and (iii) is and during the Sale Term will continue to be, duly authorized and qualified as a foreign corporation to do business and in good standing in each jurisdiction where the nature of its business or properties requires such qualification, including all jurisdictions in which the Stores are located.

  • Cash Management Services Funds received by Transfer Agent in the course of performing its services hereunder will be held in demand deposit bank accounts or money market fund accounts in the name of Transfer Agent (or its nominee) as agent for the Funds.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

Time is Money Join Law Insider Premium to draft better contracts faster.