Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.
Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).
Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.
Collateral Each of the Banks represents to the Agent and each of the other Banks that it in good faith is not relying upon any "margin stock" (as defined in Regulation U) as collateral in the extension or maintenance of the credit provided for in this Agreement.
Validity and Priority of Security Interest The provisions of this Agreement, and the other Loan Documents create legal and valid Liens on all the Collateral in favor of the Agent, for the ratable benefit of the Agent and the Lenders, and such Liens constitute perfected and continuing Liens on all the Collateral, having priority over all other Liens on the Collateral, except for those Liens identified in clauses (c), (d) and (e) of the definition of Permitted Liens securing all the Obligations, and enforceable against the Borrower and all third parties.
Delivery and Control of Security Collateral (a) Any certificates or instruments representing or evidencing Security Collateral shall be delivered to and held by or on behalf of the Collateral Trustee pursuant hereto and shall be in suitable form for transfer by delivery, or shall be accompanied by duly executed instruments of transfer or assignment in blank, all in form and substance satisfactory to the Collateral Trustee. The Collateral Trustee shall have the right, at any time in its discretion and without notice to any Pledgor, to transfer to or to register in the name of the Collateral Trustee or any of its nominees any or all of the certificates and instruments representing or evidencing the Security Collateral, if any, subject only to the revocable rights specified in Section 9(a). In addition, the Collateral Trustee shall have the right at any time to exchange certificates or instruments representing or evidencing Security Collateral, if any, for certificates or instruments of smaller or larger denominations. (b) At such time as any Pledgor has or acquires any Security Collateral in which such Pledgor has any right, title or interest and that constitutes an “uncertificated security” (within the meaning of Article 8 of the UCC), such Pledgor will use its commercially reasonable efforts to cause the issuer thereof to agree in an authenticated record substantially in the form of Exhibit B with such Pledgor and the Collateral Trustee that such issuer will comply with instructions with respect to such security originated by the Collateral Trustee without further consent of such Pledgor, such authenticated record to be in form and substance satisfactory to such issuer and the Collateral Trustee. (c) With respect to any Pledged Equity in which any Pledgor has any right, title or interest and that is not a security (within the meanings of Article 8 and Article 9 of the UCC), such Pledgor will notify each such issuer of Pledged Equity that such Pledged Equity is subject to the security interest granted hereunder. (d) With respect to any Pledged Debt in which any Pledgor has any right, title or interest, the Pledgor will notify each such issuer of Pledged Debt that such Pledged Debt is subject to the security interest granted hereunder. (e) If, at any time, an issuer converts any Pledged Equity into a “security” within the meaning of Articles 8 and 9 of the UCC, the relevant Pledgor will either (i) use its commercially reasonable efforts to cause the issuer of such Pledged Equity to issue certificates or instruments evidencing or representing the Pledged Equity and deliver the originals of such certificates or instruments promptly to the Collateral Trustee (or as directed by the Collateral Trustee), and, if it or any Person other than the relevant Pledgor, receives any such certificates or instruments, shall promptly deliver or cause to be delivered to the Collateral Trustee, the originals of such certificates or instruments or (ii) if the security is an uncertificated security (within the meaning of Article 8 of the UCC), use its commercially reasonable efforts to cause the issuer of such Pledged Equity to enter into an Uncertificated Securities Control Agreement pursuant to clause (b) above. (f) At such time as any Pledgor has or acquires any Security Collateral in which such Pledgor has any right, title or interest and that is not a security (within the meaning of Article 8 of the UCC), such Pledgor agrees that the Collateral Trustee may file a financing statement in the relevant jurisdiction. (g) No Pledgor shall take or omit to take any action which would or could reasonably be expected to have the result of materially adversely affecting or impairing the Liens in favor of the Collateral Trustee and the holders of Parity Lien Obligations with respect to the Collateral.
Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.
Valid Security Interest This Agreement creates a valid and continuing security interest (as defined in the applicable UCC) in the Sold Property in favor of the Issuer, which is prior to all other Liens, other than Permitted Liens, and is enforceable against creditors of and purchasers from the Depositor.
Collateral and Security Section 10.01.
SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.