Security Laws Sample Clauses

Security Laws. Buyer is acquiring the Properties for its (and its affiliates) own account and not with the intent to make a distribution within the meaning of the Securities Act of 1933 (as amended, and together the rules and regulations pertaining thereto, the “Securities Act”) or a distribution thereof in violation of any other applicable securities Laws.
AutoNDA by SimpleDocs
Security LawsThe obligations hereunder are subject to the granting of appropriate permits, consents and/or orders of the Commissioner of Corporations of California, if any such permits, consents or orders are then required. All parties hereto and their heirs, personal representatives and assigns shall cooperate in the execution of all documents necessary, and the taking of any corporate actions necessary to obtain any such permit, consent and/or order.
Security LawsThe obligations hereunder are subject to the granting of appropriate permits, consents and/or orders of the Commissioner of Corporations of California, if any such permits, consents or orders are then required. All parties hereto and their heirs, personal representatives and assigns shall cooperate in the execution of all documents necessary, and the taking of any corporate actions necessary to obtain any such permit, consent and/or order. . The Transferor, Terminated or Disabled Shareholder, as the case may be, agrees not to directly or indirectly divulge, communicate, use to the detriment of Corporation or for the benefit of any other person or persons, or misuse in any way, any confidential information or trade secrets of the Corporation, including personal information, forms, know how, customer lists or other technical data. The Shareholders acknowledge that the remedy at law may be inadequate to remedy a breach or intended breach of this Section and, therefore, consent to temporary or permanent injunctive relief to prevent such breach. . As used in this Agreement, the masculine, feminine or neuter gender, and the singular or plural number, shall be deemed to include the others whenever the context so requires. Executed this ____ day of _____________, at ______________, ___________ County, California. CORPORATION: By: Its: SHAREHOLDERS:
Security LawsThe Option shall not be exercisable if and to the extent the Company determines that such exercise would violate applicable state or Federal securities laws or the rules and regulations of any securities exchange or market on which the Stock is traded. If the Company makes such a determination, it shall use all reasonable efforts to obtain compliance with such laws, rules and regulations. In making any determination hereunder, the Company may rely on the opinion of counsel for the Company. If, by reason of the foregoing restrictions, the Option is not exercisable, the Company shall settle the Award by a payment of cash equal to the product of the applicable number of Covered Shares multiplied by the excess of the market value per share of the Stock over the Exercise Price.
Security Laws. Each party represents and warrants that it will to the best of its knowledge comply with all applicable securities and other laws, rules and regulations relating hereto.
Security Laws. (a) Prior to the Closing, the Company shall not take any action that would cause the number of Company Stockholders who are not "accredited investors" pursuant to Regulation D promulgated under the Securities Act to increase to more than 35 during the term of this Agreement or that would cause any Person who does not meet the standards of Regulation D required for "purchasers" under Regulation D to become a stockholder. (b) The Buyer shall take such steps as may be necessary to comply with the securities and blue sky laws of all jurisdictions which are applicable to the issuance of the Buyer Stock in connection with the transaction contemplated herein. The Company shall use its best efforts, to the extent commercially reasonable, to assist the Buyer as may be necessary to comply with such securities and blue sky laws.
Security Laws. EPC is acquiring the NPR Properties for its own account and not with the intent to make a distribution within the meaning of the Securities Act of 1933 (and the rules and regulations pertaining thereto) or a distribution thereof in violation of any other applicable securities Laws.
AutoNDA by SimpleDocs
Security LawsGrantee agrees to comply with all applicable securities laws upon sales or disposition of shares acquired hereunder.
Security Laws. Nothing in this Plan or in any Award or Award Agreement shall require the Company to issue any Shares with respect to any Award if, in the opinion of counsel for the Company, that issuance could constitute a violation of the Securities Act, any other law or the rules of any applicable securities exchange or securities association then in effect. As a condition to the grant or exercise of an Award, the Company may require the Participant (or, in the event of the Participant's death, the Participant's legal representatives, heirs, legatees or distributees) to provide written representations concerning the Participant's (or such other person's) intentions with regard to the retention or disposition of the Shares covered by the Award and written covenants as to the manner of disposal of such Shares as may be necessary or useful to ensure that the grant, exercise or disposition will not violate the Securities Act, and other law or any rule of any applicable securities exchange or securities association then in effect. The Company shall not be required to register any Shares under the Securities Act or register or qualify any Shares under any state or other securities laws.

Related to Security Laws

  • Data Protection Act 7.1 With respect to the parties' rights and obligations under this Contract, the parties agree that the Department is the Data Controller and that the Contractor is the Data Processor. 7.2 The Contractor shall: 7.2.1 Process the Personal Data only in accordance with instructions from the Department (which may be specific instructions or instructions of a general nature as set out in this Contract or as otherwise notified by the Department to the Contractor during the Term); 7.2.2 Process the Personal Data only to the extent, and in such manner, as is necessary for the provision of the Services or as is required by Law or any Regulatory Body; 7.2.3 The Contractor shall employ appropriate organisational, operational and technological processes and procedures to keep the Personal Data safe from unauthorised use or access, loss, destruction, theft or disclosure. The organisational, operational and technological processes and procedures adopted are required to comply with the requirements of ISO/IEC 27001 as appropriate to the services being provided to the Department; 7.2.4 Take reasonable steps to ensure the reliability of any Contractor Personnel who have access to the Personal Data; 7.2.5 Obtain prior written consent from the Department in order to transfer the Personal Data to any Sub-contractors or Affiliates for the provision of the Services; 7.2.6 Ensure that all Contractor Personnel required to access the Personal Data are informed of the confidential nature of the Personal Data and comply with the obligations set out in this clause 7; 7.2.7 Ensure that none of Contractor Personnel publish, disclose or divulge any of the Personal Data to any third party unless directed in writing to do so by the Department; 7.2.8 Notify the Department within five Working Days if it receives: a request from a Data Subject to have access to that person's Personal Data; or a complaint or request relating to the Department's obligations under the Data Protection Legislation; 7.2.9 Provide the Department with full cooperation and assistance in relation to any complaint or request made, including by: - providing the Department with full details of the complaint or request; - complying with a data access request within the relevant timescales set out in the Data Protection Legislation and in accordance with the Department's instructions; - providing the Department with any Personal Data it holds in relation to a Data Subject (within the timescales required by the Department); and - providing the Department with any information requested by the Department; 7.2.10 Permit the Department or the Department’s Representative (subject to reasonable and appropriate confidentiality undertakings), to inspect and audit the Contractor's data Processing activities (and/or those of its agents, subsidiaries and Sub-contractors) and comply with all reasonable requests or directions by the Department to enable the Department to verify and/or procure that the Contractor is in full compliance with its obligations under this Contract; 7.2.11 Provide a written description of the technical and organisational methods employed by the Contractor for processing Personal Data (within the timescales required by the Department) to be used solely for the purposes of this contract and provided that to do so would not be in breach of the Intellectual Property Rights (including Copyright) of a third party; and 7.2.12 Not process Personal Data outside the European Economic Area without the prior written consent of the Department and, where the Department consents to a transfer, to comply with: - the obligations of a Data Controller under the Eighth Data Protection Principle set out in Schedule 1 of the Data Protection Act 1998 by providing -an adequate level of protection to any Personal Data that is transferred; and - any reasonable instructions notified to it by the Department. 7.3 The Contractor shall comply at all times with the Data Protection Legislation and shall not perform its obligations under this Contract in such a way as to cause the Department to breach any of its applicable obligations under the Data Protection Legislation.

  • Data Protection Laws those laws applicable to the processing of personal data in the relevant jurisdictions, including but not limited to the General Data Protection Regulation 2016/679.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated 7.2. E-Bidders shall be responsible for the confidentiality and use of password and not to reveal the password to anyone at any time and under any circumstances whether intentionally or unintentionally. 7.3. E-Bidders agree to comply with all the security measures related to safety of the password or generally in respect of the use of the service. In the event that the password is compromised, the E-Bidders shall immediately notify PAH.

  • Data Protection Legislation the UK Data Protection Legislation and any other European Union legislation relating to personal data and all other legislation and regulatory requirements in force from time to time which apply to a party relating to the use of personal data (including, without limitation, the privacy of electronic communications).

  • Canadian Anti-Money Laundering Legislation (a) Each Loan Party acknowledges that, pursuant to the Proceeds of Crime Act and other applicable anti-money laundering, anti-terrorist financing, government sanction and “know your client” laws (collectively, including any guidelines or orders thereunder, “AML Legislation”), the Secured Parties may be required to obtain, verify and record information regarding the Loan Parties and their respective directors, authorized signing officers, direct or indirect shareholders or other Persons in control of the Loan Parties, and the transactions contemplated hereby. Each Loan Party shall promptly provide all such information, including supporting documentation and other evidence, as may be reasonably requested by any Secured Party or any prospective assignee or participant of a Secured Party, in order to comply with any applicable AML Legislation, whether now or hereafter in existence. (b) If the Administrative Agent has ascertained the identity of any Loan Party or any authorized signatories of the Loan Parties for the purposes of applicable AML Legislation, then the Administrative Agent: (i) shall be deemed to have done so as an agent for each Secured Party, and this Agreement shall constitute a “written agreement” in such regard between each Secured Party and the Administrative Agent within the meaning of the applicable AML Legislation; and (ii) shall provide to each Secured Party copies of all information obtained in such regard without any representation or warranty as to its accuracy or completeness. Notwithstanding the preceding sentence and except as may otherwise be agreed in writing, each of the Lenders agrees that the Administrative Agent has no obligation to ascertain the identity of the Loan Parties or any authorized signatories of the Loan Parties on behalf of any Lender, or to confirm the completeness or accuracy of any information it obtains from any Loan Party or any such authorized signatory in doing so

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Anti-Money Laundering Legislation (a) Each Loan Party acknowledges that, pursuant to the Proceeds of Crime Money Laundering) and Terrorist Financing Act (Canada) and other applicable anti-money laundering, anti-terrorist financing, government sanction and “know your client” laws, under the laws of Canada (collectively, including any guidelines or orders thereunder, “AML Legislation”), Agent and Lenders may be required to obtain, verify and record information regarding each Loan Party, its respective directors, authorized signing officers, direct or indirect shareholders or other Persons in control of such Loan Party, and the transactions contemplated hereby. Administrative Borrower shall promptly provide all such information, including supporting documentation and other evidence, as may be reasonably requested by any Lender or Agent, or any prospective assign or participant of a Lender or Agent, necessary in order to comply with any applicable AML Legislation, whether now or hereafter in existence. (b) If Agent has ascertained the identity of any Loan Party or any authorized signatories of any Loan Party for the purposes of applicable AML Legislation, then the Agent: (i) shall be deemed to have done so as an agent for each Lender, and this Agreement shall constitute a “written agreement” in such regard between each Lender and the Agent within the meaning of applicable AML Legislation; and (ii) shall provide to each Lender copies of all information obtained in such regard without any representation or warranty as to its accuracy or completeness. (c) Notwithstanding the provisions of this Section and except as may otherwise be agreed in writing, each Lender agrees that Agent has no obligation to ascertain the identity of the Loan Parties or any authorized signatories of the Loan Parties on behalf of any Lender, or to confirm the completeness or accuracy of any information it obtains from the Loan Parties or any such authorized signatory in doing so.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!