Security Laws Sample Clauses

A Security Laws clause establishes that the parties must comply with all applicable laws and regulations related to security, such as data protection, cybersecurity, and physical security requirements. In practice, this means that each party is responsible for ensuring their operations, systems, and processes adhere to relevant legal standards, which may include implementing safeguards for sensitive information or following specific industry protocols. The core function of this clause is to allocate responsibility and reduce legal risk by ensuring that all parties are aware of and adhere to the necessary security-related legal obligations.
Security Laws. Buyer is acquiring the Conveyed Properties for its own account and not with the intent to make a distribution within the meaning of the Securities Act of 1933 (as amended, and together the rules and regulations pertaining thereto, the “Securities Act”) or a distribution thereof in violation of any other applicable securities Laws.
Security Laws. The obligations hereunder are subject to the granting of appropriate permits, consents and/or orders of the Commissioner of Corporations of California, if any such permits, consents or orders are then required. All parties hereto and their heirs, personal representatives and assigns shall cooperate in the execution of all documents necessary, and the taking of any corporate actions necessary to obtain any such permit, consent and/or order. . The Transferor, Terminated or Disabled Shareholder, as the case may be, agrees not to directly or indirectly divulge, communicate, use to the detriment of Corporation or for the benefit of any other person or persons, or misuse in any way, any confidential information or trade secrets of the Corporation, including personal information, forms, know how, customer lists or other technical data. The Shareholders acknowledge that the remedy at law may be inadequate to remedy a breach or intended breach of this Section and, therefore, consent to temporary or permanent injunctive relief to prevent such breach. . As used in this Agreement, the masculine, feminine or neuter gender, and the singular or plural number, shall be deemed to include the others whenever the context so requires. Executed this ____ day of _____________, at ______________, ___________ County, California. CORPORATION: By: Its: SHAREHOLDERS:
Security Laws. The obligations hereunder are subject to the granting of appropriate permits, consents and/or orders of the Commissioner of Corporations of California, if any such permits, consents or orders are then required. All parties hereto and their heirs, personal representatives and assigns shall cooperate in the execution of all documents necessary, and the taking of any corporate actions necessary to obtain any such permit, consent and/or order.
Security Laws. EPC is acquiring the NPR Properties for its own account and not with the intent to make a distribution within the meaning of the Securities Act of 1933 (and the rules and regulations pertaining thereto) or a distribution thereof in violation of any other applicable securities Laws.
Security Laws. (a) Prior to the Closing, the Company shall not take any action that would cause the number of Company Stockholders who are not "accredited investors" pursuant to Regulation D promulgated under the Securities Act to increase to more than 35 during the term of this Agreement or that would cause any Person who does not meet the standards of Regulation D required for "purchasers" under Regulation D to become a stockholder. (b) The Buyer shall take such steps as may be necessary to comply with the securities and blue sky laws of all jurisdictions which are applicable to the issuance of the Buyer Stock in connection with the transaction contemplated herein. The Company shall use its best efforts, to the extent commercially reasonable, to assist the Buyer as may be necessary to comply with such securities and blue sky laws.
Security Laws. Each party represents and warrants that it will to the best of its knowledge comply with all applicable securities and other laws, rules and regulations relating hereto.
Security Laws. The Option shall not be exercisable if and to the extent the Company determines that such exercise would violate applicable state or Federal securities laws or the rules and regulations of any securities exchange or market on which the Stock is traded. If the Company makes such a determination, it shall use all reasonable efforts to obtain compliance with such laws, rules and regulations. In making any determination hereunder, the Company may rely on the opinion of counsel for the Company. If, by reason of the foregoing restrictions, the Option is not exercisable, the Company shall settle the Award by a payment of cash equal to the product of the applicable number of Covered Shares multiplied by the excess of the market value per share of the Stock over the Exercise Price.
Security Laws. Nothing in this Plan or in any Award or Award Agreement shall require the Company to issue any Shares with respect to any Award if, in the opinion of counsel for the Company, that issuance could constitute a violation of the Securities Act, any other law or the rules of any applicable securities exchange or securities association then in effect. As a condition to the grant or exercise of an Award, the Company may require the Participant (or, in the event of the Participant's death, the Participant's legal representatives, heirs, legatees or distributees) to provide written representations concerning the Participant's (or such other person's) intentions with regard to the retention or disposition of the Shares covered by the Award and written covenants as to the manner of disposal of such Shares as may be necessary or useful to ensure that the grant, exercise or disposition will not violate the Securities Act, and other law or any rule of any applicable securities exchange or securities association then in effect. The Company shall not be required to register any Shares under the Securities Act or register or qualify any Shares under any state or other securities laws.
Security Laws. Grantee agrees to comply with all applicable securities laws upon sales or disposition of shares acquired hereunder.

Related to Security Laws

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Data Protection Act 7.1 With respect to the parties' rights and obligations under this Contract, the parties agree that the Department is the Data Controller and that the Contractor is the Data Processor. 7.2 The Contractor shall: 7.2.1 Process the Personal Data only in accordance with instructions from the Department (which may be specific instructions or instructions of a general nature as set out in this Contract or as otherwise notified by the Department to the Contractor during the Term); 7.2.2 Process the Personal Data only to the extent, and in such manner, as is necessary for the provision of the Services or as is required by Law or any Regulatory Body; 7.2.3 The Contractor shall employ appropriate organisational, operational and technological processes and procedures to keep the Personal Data safe from unauthorised use or access, loss, destruction, theft or disclosure. The organisational, operational and technological processes and procedures adopted are required to comply with the requirements of ISO/IEC 27001 as appropriate to the services being provided to the Department; 7.2.4 Take reasonable steps to ensure the reliability of any Contractor Personnel who have access to the Personal Data; 7.2.5 Obtain prior written consent from the Department in order to transfer the Personal Data to any Sub-contractors or Affiliates for the provision of the Services; 7.2.6 Ensure that all Contractor Personnel required to access the Personal Data are informed of the confidential nature of the Personal Data and comply with the obligations set out in this clause 7; 7.2.7 Ensure that none of Contractor Personnel publish, disclose or divulge any of the Personal Data to any third party unless directed in writing to do so by the Department; 7.2.8 Notify the Department within five Working Days if it receives: a request from a Data Subject to have access to that person's Personal Data; or a complaint or request relating to the Department's obligations under the Data Protection Legislation; 7.2.9 Provide the Department with full cooperation and assistance in relation to any complaint or request made, including by: - providing the Department with full details of the complaint or request; - complying with a data access request within the relevant timescales set out in the Data Protection Legislation and in accordance with the Department's instructions; - providing the Department with any Personal Data it holds in relation to a Data Subject (within the timescales required by the Department); and - providing the Department with any information requested by the Department; 7.2.10 Permit the Department or the Department’s Representative (subject to reasonable and appropriate confidentiality undertakings), to inspect and audit the Contractor's data Processing activities (and/or those of its agents, subsidiaries and Sub-contractors) and comply with all reasonable requests or directions by the Department to enable the Department to verify and/or procure that the Contractor is in full compliance with its obligations under this Contract; 7.2.11 Provide a written description of the technical and organisational methods employed by the Contractor for processing Personal Data (within the timescales required by the Department) to be used solely for the purposes of this contract and provided that to do so would not be in breach of the Intellectual Property Rights (including Copyright) of a third party; and 7.2.12 Not process Personal Data outside the European Economic Area without the prior written consent of the Department and, where the Department consents to a transfer, to comply with: - the obligations of a Data Controller under the Eighth Data Protection Principle set out in Schedule 1 of the Data Protection Act 1998 by providing -an adequate level of protection to any Personal Data that is transferred; and - any reasonable instructions notified to it by the Department. 7.3 The Contractor shall comply at all times with the Data Protection Legislation and shall not perform its obligations under this Contract in such a way as to cause the Department to breach any of its applicable obligations under the Data Protection Legislation.

  • Data Protection Laws those laws applicable to the processing of personal data in the relevant jurisdictions, including but not limited to the General Data Protection Regulation 2016/679.

  • Security Practices Dell has implemented corporate information security practices and standards that are designed to safeguard the Dell’s corporate environment and to address: (1) information security; (2) system and asset management; (3) development; and (4) governance. These practices and standards are approved by the Dell CIO and undergo a formal review on an annual basis.

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated 7.2. E-Bidders shall be responsible for the confidentiality and use of password and not to reveal the password to anyone at any time and under any circumstances whether intentionally or unintentionally. 7.3. E-Bidders agree to comply with all the security measures related to safety of the password or generally in respect of the use of the service. In the event that the password is compromised, the E-Bidders shall immediately notify PAH.