Security for Obligations This Agreement secures, and the Collateral is collateral security for, the prompt and complete payment or performance in full when due, whether at stated maturity, by required prepayment, declaration, acceleration, demand or otherwise (including the payment of amounts that would become due but for the operation of the automatic stay under Section 362(a) of the Bankruptcy Code, 11 U.S.C. §362(a) (and any successor provision thereof)), of all Obligations with respect to every Grantor (the “Secured Obligations”).
LOAN 2.01. The Bank agrees to lend to the Borrower, on the terms and conditions set forth or referred to in this Agreement, the amount of one hundred million Dollars ($100,000,000), as such amount may be converted from time to time through a Currency Conversion in accordance with the provisions of Section 2.07 of this Agreement (“Loan”), to assist in financing the project described in Schedule 1 to this Agreement (“Project”).
Funding Obligations 6.1 Grantee acknowledges that HHSC’s obligation for payment, in consideration of full and satisfactory performance of activities described in this Contract, is limited to monies received from the Administration on Aging (“AoA”), the State, and any other funding source.
Repayment and Recovery (a) At the End of a Funding Year. If, in any Funding Year, the HSP has not spent all of the Funding the LHIN will require the repayment of the unspent Funding.
Information Collection Information collection activities performed under this award are the responsibility of the awardee, and NSF support of the project does not constitute NSF approval of the survey design, questionnaire content or information collection procedures. The awardee shall not represent to respondents that such information is being collected for or in association with the National Science Foundation or any other Government agency without the specific written approval of such information collection plan or device by the Foundation. This requirement, however, is not intended to preclude mention of NSF support of the project in response to an inquiry or acknowledgment of such support in any publication of this information.
Priority of Documents The documents forming the Contract are to be taken as mutually explanatory of one another. For the purposes of interpretation, the priority of the documents shall be in accordance with the following sequence:
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
Additional Obligations of Applicant Section 8.1.
Subordinate Loan Documents The executed Subordinate Loan Documents are substantially in the same form as those submitted to, and approved by, HUD prior to the date of this Agreement. Upon execution and delivery of the Subordinate Loan Documents, Borrower shall deliver to Senior Lender an executed copy of each of the Subordinate Loan Documents, certified to be true, correct and complete.