Security Logbooks Sample Clauses

Security Logbooks. 4.1.7 Cellular telephone for use by Contractor’s on-duty Cover Officer or Shift Supervisor for emergency situations only.
AutoNDA by SimpleDocs

Related to Security Logbooks

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Collateral Records Such Grantor will maintain complete and accurate books and records with respect to the Collateral owned by it, and furnish to the Collateral Agent, with sufficient copies for each of the Secured Parties, such reports relating to such Collateral as the Collateral Agent shall from time to time request.

  • Financing Statement and Books and Records (a) In connection with the conveyance of the Assets hereunder, the Transferor agrees that prior to the Closing Date, it will file, at its own expense, one or more financing statements with respect to the Assets meeting the requirements of applicable state law in such manner as necessary to perfect the sale of the Assets to the Transferee, and the proceeds thereof (and any continuation statements as are required by applicable state law), and will deliver a file-stamped copy of each such financing statement (or continuation statement) or other evidence of such filings (which may, for purposes of this Section, consist of telephone confirmation of such filings with the file stamped copy of each such filings to be provided to the Transferee in due course) to the Transferee, as soon as is practicable after receipt by the Transferor thereof.

  • Machine Readable Records At the request of the Master Servicer, the Servicer shall provide to the Master Servicer, in a mutually agreed machine readable format, the current names and mailing addresses of each Borrower. The Master Servicer shall utilize such information solely for audit purposes, or in the event the Servicer is terminated hereunder.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Protection of Title (a) The Seller shall authorize and file such financing statements and cause to be authorized and filed such continuation and other financing statements, all in such manner and in such places as may be required by law fully to preserve, maintain and protect the interest of the Issuer and the Indenture Trustee under this Agreement in the Purchased Assets (to the extent that the interest of the Issuer or the Indenture Trustee therein can be perfected by the filing of a financing statement). The Seller shall deliver (or cause to be delivered) to the Issuer file-stamped copies of, or filing receipts for, any document filed as provided above, as soon as available following such filing.

  • Tape-recording The Fund on behalf of itself and its Customers authorizes the Custodian to tape record any and all telephonic or other oral instructions given to the Custodian by or on behalf of the Fund, including from any Authorized Person. This authorization will remain in effect until and unless revoked by the Fund in writing. The Fund further agrees to solicit valid written or other consent from any of its employees with respect to telephone communications to the extent such consent is required by applicable law.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Engines POSITION SERIAL NO. TOTAL HOURS TOTAL CYCLES HRS/CYCLES SINCE LAST SHOP VISIT Time Remaining to Next LIFE LIMITED PART REMOVAL PART NAME HOURS CYCLES MSN MSN

  • Database File The Servicer will provide the Successor Servicer with a magnetic tape (in a format reasonably acceptable to the Indenture Trustee and the Servicer) containing the database file for each Contract (i) as of the Initial Cutoff Date, (ii) the Subsequent Cutoff Date, (iii) thereafter, as of the last day of the preceding Due Period on each Determination Date prior to a Service Transfer and (iv) on and as of the Business Day before the actual commencement of servicing functions by the Successor Servicer following the occurrence of a Service Transfer.

Time is Money Join Law Insider Premium to draft better contracts faster.