SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.
Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.
Data Protection Legislation the UK Data Protection Legislation and any other European Union legislation relating to personal data and all other legislation and regulatory requirements in force from time to time which apply to a party relating to the use of Personal Data (including, without limitation, the privacy of electronic communications) and the guidance and codes of practice issued by the Information Commissioner or relevant government department in relation to such legislation.
Canadian Anti-Money Laundering Legislation (a) Each Loan Party acknowledges that, pursuant to the Proceeds of Crime Act and other applicable anti-money laundering, anti-terrorist financing, government sanction and “know your client” laws (collectively, including any guidelines or orders thereunder, “AML Legislation”), the Secured Parties may be required to obtain, verify and record information regarding the Loan Parties and their respective directors, authorized signing officers, direct or indirect shareholders or other Persons in control of the Loan Parties, and the transactions contemplated hereby. Each Loan Party shall promptly provide all such information, including supporting documentation and other evidence, as may be reasonably requested by any Secured Party or any prospective assignee or participant of a Secured Party, in order to comply with any applicable AML Legislation, whether now or hereafter in existence. (b) If the Administrative Agent has ascertained the identity of any Loan Party or any authorized signatories of the Loan Parties for the purposes of applicable AML Legislation, then the Administrative Agent: (i) shall be deemed to have done so as an agent for each Secured Party, and this Agreement shall constitute a “written agreement” in such regard between each Secured Party and the Administrative Agent within the meaning of the applicable AML Legislation; and (ii) shall provide to each Secured Party copies of all information obtained in such regard without any representation or warranty as to its accuracy or completeness. Notwithstanding the preceding sentence and except as may otherwise be agreed in writing, each of the Lenders agrees that the Administrative Agent has no obligation to ascertain the identity of the Loan Parties or any authorized signatories of the Loan Parties on behalf of any Lender, or to confirm the completeness or accuracy of any information it obtains from any Loan Party or any such authorized signatory in doing so
Security Agreement under Uniform Commercial Code It is the intention of the parties hereto that this Mortgage shall constitute a Security Agreement within the meaning of Article 9 of the Uniform Commercial Code of the State of New York. Notwithstanding the filing of a financing statement covering any of the Mortgaged Property in the records normally pertaining to personal property, all of the Mortgaged Property, for all purposes and in all proceedings, legal or equitable, shall be regarded, at Mortgagees' option (to the extent permitted by law) as part of the Real Estate whether or not any such item is physically attached to the Real Estate or serial numbers are used for the better identification of certain items. The mention in any such financing statement of any of the Mortgaged Property shall never be construed as in any way derogating from or impairing this declaration and it is the hereby stated intention of the parties that such mention in protection of Mortgagee in the event any court shall at any time hold that notice of Mortgagee's priority of interest, to be effective against any third party, including the federal government and any authority or agency thereof, must be filed in the Uniform Commercial Code records. Mortgagor and Borrower hereby agree that each shall execute and hereby authorizes Mortgagee to file any financing and continuation statements which Mortgagee shall determine in its sole discretion are necessary or advisable in order to perfect it security interest in the Equipment and Personalty covered by this Mortgage, and Borrower shall pay any expenses incurred by Mortgagee in connection with the preparation, execution and filing of such statements that may be filed by Mortgagee, or, if paid by Mortgagee, such amounts, together with interest at the Default Rate, shall be added to the Indebtedness, payable on demand, and shall be secured by this Mortgage.
Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.
Anti-Money Laundering Legislation (a) Each Loan Party acknowledges that, pursuant to the Proceeds of Crime Money Laundering) and Terrorist Financing Act (Canada) and other applicable anti-money laundering, anti-terrorist financing, government sanction and “know your client” laws, under the laws of Canada (collectively, including any guidelines or orders thereunder, “AML Legislation”), Agent and Lenders may be required to obtain, verify and record information regarding each Loan Party, its respective directors, authorized signing officers, direct or indirect shareholders or other Persons in control of such Loan Party, and the transactions contemplated hereby. Administrative Borrower shall promptly provide all such information, including supporting documentation and other evidence, as may be reasonably requested by any Lender or Agent, or any prospective assign or participant of a Lender or Agent, necessary in order to comply with any applicable AML Legislation, whether now or hereafter in existence. (b) If Agent has ascertained the identity of any Loan Party or any authorized signatories of any Loan Party for the purposes of applicable AML Legislation, then the Agent: (i) shall be deemed to have done so as an agent for each Lender, and this Agreement shall constitute a “written agreement” in such regard between each Lender and the Agent within the meaning of applicable AML Legislation; and (ii) shall provide to each Lender copies of all information obtained in such regard without any representation or warranty as to its accuracy or completeness. (c) Notwithstanding the provisions of this Section and except as may otherwise be agreed in writing, each Lender agrees that Agent has no obligation to ascertain the identity of the Loan Parties or any authorized signatories of the Loan Parties on behalf of any Lender, or to confirm the completeness or accuracy of any information it obtains from the Loan Parties or any such authorized signatory in doing so.
Uniform Commercial Code Security Agreement (a) This Instrument is also a security agreement under the Uniform Commercial Code for any of the Mortgaged Property which, under applicable law, may be subjected to a security interest under the Uniform Commercial Code, whether such Mortgaged Property is owned now or acquired in the future, and all products and cash and non-cash proceeds thereof (collectively, "UCC Collateral"), and Borrower hereby grants to Lender a security interest in the UCC Collateral. Borrower hereby authorizes Lender to prepare and file financing statements, continuation statements and financing statement amendments in such form as Lender may require to perfect or continue the perfection of this security interest and Borrower agrees, if Lender so requests, to execute and deliver to Lender such financing statements, continuation statements and amendments. Borrower shall pay all filing costs and all costs and expenses of any record searches for financing statements and/or amendments that Lender may require. Without the prior written consent of Lender, Borrower shall not create or permit to exist any other lien or security interest in any of the UCC Collateral. (b) Unless Borrower gives Notice to Lender within 30 days after the occurrence of any of the following, and executes and delivers to Lender modifications or supplements of this Instrument (and any financing statement which may be filed in connection with this Instrument) as Lender may require, Borrower shall not (i) change its name, identity, structure or jurisdiction of organization; (ii) change the location of its place of business (or chief executive office if more than one place of business); or (iii) add to or change any location at which any of the Mortgaged Property is stored, held or located. (c) If an Event of Default has occurred and is continuing, Lender shall have the remedies of a secured party under the Uniform Commercial Code, in addition to all remedies provided by this Instrument or existing under applicable law. In exercising any remedies, Lender may exercise its remedies against the UCC Collateral separately or together, and in any order, without in any way affecting the availability of Lender's other remedies. (d) This Instrument constitutes a financing statement with respect to any part of the Mortgaged Property that is or may become a Fixture, if permitted by applicable law.