Security of System Sample Clauses

Security of System. The User shall be responsible for the confidentiality ------------------ and use of any passwords and other security data, methods and devices issued to or obtained by it or its employees, representatives or agents in connection with the use of WebStation. The User shall comply with the security procedures established by Fidelity for WebStation, including the use of passwords and/or encryption methods. The User agrees to promptly notify Fidelity of any unauthorized, negligent or inadvertent use of the system of which it is aware. The User further agrees to notify Fidelity of the termination of any employee who was granted access to WebStation. Fidelity retains the right to immediately suspend or withdraw access to WebStation, if, in Fidelity's opinion, such action is necessary to maintain the integrity of WebStation.
AutoNDA by SimpleDocs
Security of System. The User shall be responsible for the confidentiality ------------------- and use of any passwords and other security data, methods and devices issued to or obtained by it or its employees, representatives or agents in connection with the use of the WebStation. The User shall comply with the security procedures established by Fidelity for WebStation, including the use of passwords and/or encryption methods. The User agrees to promptly notify Fidelity of any unauthorized, negligent or inadvertent use of the system of which it is aware. The User further agrees to notify Fidelity of the termination of any employee who was granted access to Plan Sponsor WebStation. Fidelity retains the right to immediately suspend or withdraw access to WebStation, if, in Fidelity's opinion, such action is necessary to maintain the integrity of WebStation.

Related to Security of System

  • Security System Landlord shall not be obligated to provide or maintain any security patrol or security system. Landlord shall not be responsible for the quality of any such patrol or system which may be provided hereunder or for damage or injury to Tenant, its employees, invitees or others due to the failure, action or inaction of such patrol or system.

  • Creation, Perfection and Priority of Security Interests The representations and warranties regarding creation, perfection and priority of security interests in the Purchased Property, which are attached to this Agreement as Appendix B, are true and correct to the extent that they are applicable.

  • Perfection and Protection of Security Interest Borrower shall, at its expense, take all actions requested by FINOVA at any time to perfect, maintain, protect and enforce FINOVA's first priority security interest and other rights in the Collateral and the priority thereof from time to time, including, without limitation, (i) executing and filing financing or continuation statements and amendments thereof and executing and delivering such documents and titles in connection with motor vehicles as FINOVA shall require, all in form and substance satisfactory to FINOVA, (ii) maintaining a perpetual inventory and complete and accurate stock records, (iii) delivering to FINOVA warehouse receipts covering any portion of the Collateral located in warehouses and for which warehouse receipts are issued, and transferring Inventory to warehouses designated by FINOVA, (iv) placing notations on Borrower's books of account to disclose FINOVA's security interest therein and (v) delivering to FINOVA all letters of credit on which Borrower is named beneficiary. FINOVA may file, without Borrower's signature, one or more financing statements disclosing FINOVA's security interest under this Agreement. Borrower agrees that a carbon, photographic, photostatic or other reproduction of this Agreement or of a financing statement is sufficient as a financing statement. If any Collateral is at any time in the possession or control of any warehouseman, bailee or any of Borrower's agents or processors, Borrower shall notify such Person of FINOVA's security interest in such Collateral and, upon FINOVA's request, instruct them to hold all such Collateral for FINOVA's account subject to FINOVA's instructions. From time to time, Borrower shall, upon FINOVA's request, execute and deliver confirmatory written instruments pledging the Collateral to FINOVA, but Borrower's failure to do so shall not affect or limit FINOVA's security interest or other rights in and to the Collateral. Until the Obligations have been fully satisfied and FINOVA's obligation to make further advances hereunder has terminated, FINOVA's security interest in the Collateral shall continue in full force and effect.

  • Preservation and Protection of Collateral (a) The Administrative Agent shall be under no duty or liability with respect to the collection, protection or preservation of the Collateral, or otherwise, beyond the use of reasonable care in the custody and preservation thereof while in its possession.

  • Physical Security of Media Transfer Agent shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is stored by Transfer Agent (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on Transfer Agent encryption policies.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Creation, Perfection and Priority of Liens The execution and delivery of the Collateral Documents by Loan Parties and Sponsors, together with (i) the actions taken on or prior to the date hereof pursuant to subsections 4.1, 4.2, 6.8 and 6.9 and (ii) the delivery to Administrative Agent of any Pledged Collateral not delivered to Administrative Agent at the time of execution and delivery of the applicable Collateral Document (all of which Pledged Collateral has been so delivered) are effective to create in favor of Administrative Agent for the benefit of Lenders, as security for the respective Secured Obligations (as defined in the applicable Collateral Document in respect of any Collateral), a valid and perfected First Priority Lien on all of the Collateral, and all filings and other actions necessary or desirable to perfect and maintain the perfection and First Priority status of such Liens have been duly made or taken and remain in full force and effect, other than the filing of any UCC financing statements or Mortgages delivered to Administrative Agent for filing or recording, as applicable (but not yet filed or recorded) and the periodic filing of UCC continuation statements in respect of UCC financing statements filed by or on behalf of Administrative Agent.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Priority of Security Interests Notwithstanding (i) the time, order, manner or method of creation, attachment or perfection of the respective Security Interests and/or Liens granted to any Secured Party in or on any or all of the property or assets of the Grantors, (ii) the time or manner of the filing of the financing statements reflecting such Security Interests, (iii) whether any Secured Party or any bailee or agent thereof holds possession of any or all of the property or assets of the Grantors, (iv) the dating, execution or delivery of any agreement, document or instrument granting any Secured Party Security Interests and/or Liens in or on any or all of the property or assets of the Grantors and (v) any provision of the UCC or any other applicable law to the contrary, (y) any and all Security Interests, Liens, rights and interests of the Senior Indenture Trustee and/or holders of Senior Notes, whether now or hereafter arising and howsoever existing, in or on any or all of the Collateral, shall be and hereby are subordinated to any and all Security Interests, Liens, rights and interests of the Administrative Agent in and to the Collateral, and (z) any and all Security Interests, Liens, rights and interests of the Junior Indenture Trustee and/or holders of Junior Notes, whether now or hereafter arising and howsoever existing, in or on any or all of the Collateral, shall be and hereby are subordinated to any and all Security Interests, Liens, rights and interests of the Administrative Agent and the Senior Indenture Trustee and/or holders of Senior Notes in and to the Collateral. For purposes of the foregoing allocation of priorities, any claim of a right of setoff shall be treated in all respects as a Security Interest, and no claimed right of setoff shall be asserted to defeat or diminish the rights or priorities provided for herein.

  • Priority of Security Interest Borrower represents, warrants, and covenants that the security interest granted herein is and shall at all times continue to be a first priority perfected security interest in the Collateral (subject only to Permitted Liens that are permitted pursuant to the terms of this Agreement to have superior priority to Bank’s Lien under this Agreement). If Borrower shall acquire a commercial tort claim, Borrower shall promptly notify Bank in a writing signed by Borrower of the general details thereof and grant to Bank in such writing a security interest therein and in the proceeds thereof, all upon the terms of this Agreement, with such writing to be in form and substance reasonably satisfactory to Bank.

Time is Money Join Law Insider Premium to draft better contracts faster.