Security of the Agency Sample Clauses

Security of the Agency. 1. The Agency adopts its internal rules and procedures necessary to ensure security and maintenance of good order inside the buildings and other premises used by it. The Agency may, in particular, refuse access to its buildings or other premises or expel any persons considered undesirable. 2. The Agency may appoint security staff to protect its premises, assets, information, staff and visitors. The bearing of firearms by security guards or bodyguards falls under the law of the Republic of Poland and requires the prior authorisation of the Polish Party.
AutoNDA by SimpleDocs

Related to Security of the Agency

  • General Authority of the Collateral Agent By acceptance of the benefits of this Agreement and any other Collateral Documents, each Secured Party (whether or not a signatory hereto) shall be deemed irrevocably (a) to consent to the appointment of the Collateral Agent as its agent hereunder and under such other Collateral Documents, (b) to confirm that the Collateral Agent shall have the authority to act as the exclusive agent of such Secured Party for the enforcement of any provisions of this Agreement and such other Collateral Documents against any Grantor, the exercise of remedies hereunder or thereunder and the giving or withholding of any consent or approval hereunder or thereunder relating to any Collateral or any Grantor’s obligations with respect thereto, (c) to agree that it shall not take any action to enforce any provisions of this Agreement or any other Collateral Document against any Grantor, to exercise any remedy hereunder or thereunder or to give any consents or approvals hereunder or thereunder except as expressly provided in this Agreement or any other Collateral Document and (d) to agree to be bound by the terms of this Agreement and any other Collateral Documents.

  • Security of Vendor Facilities All Vendor and Vendor Staff facilities in which Citizens Confidential Information is located or housed shall be maintained in a reasonably secure manner. Within such facilities, all printed materials containing Citizens Confidential Information should be kept locked in a secure office, file cabinet, or desk (except when materials are being used).

  • Maturity of Receivables Each Receivable shall have an original maturity of not less than 24 months nor greater than 72 months and, as of the Cutoff Date, a remaining maturity of not less than 6 months nor greater than 69 months.

  • RATIFICATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT Borrower hereby ratifies, confirms, and reaffirms, all and singular, the terms and conditions of the IP Agreement and acknowledges, confirms and agrees that the IP Agreement contains an accurate and complete listing of all Intellectual Property.

  • Creation, Perfection and Priority of Security Interests The representations and warranties regarding creation, perfection and priority of security interests in the Purchased Property, which are attached to this Agreement as Appendix B, are true and correct to the extent that they are applicable.

  • Security Interest/Priority This Security Agreement creates a valid security interest in favor of the Agent, for the benefit of the Lenders, in the Collateral of such Obligor and, when properly perfected by filing, shall constitute a valid perfected security interest in such Collateral, to the extent such security can be perfected by filing under the UCC, free and clear of all Liens except for Permitted Liens.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Validity and Priority of Security Interest The provisions of this Agreement, and the other Loan Documents create legal and valid Liens on all the Collateral in favor of the Agent, for the ratable benefit of the Agent and the Lenders, and such Liens constitute perfected and continuing Liens on all the Collateral, having priority over all other Liens on the Collateral, except for those Liens identified in clauses (c), (d) and (e) of the definition of Permitted Liens securing all the Obligations, and enforceable against the Borrower and all third parties.

  • Priority of Security Interest Borrower represents, warrants, and covenants that the security interest granted herein is and shall at all times continue to be a first priority perfected security interest in the Collateral (subject only to Permitted Liens that are permitted pursuant to the terms of this Agreement to have superior priority to Bank’s Lien under this Agreement). If Borrower shall acquire a commercial tort claim, Borrower shall promptly notify Bank in a writing signed by Borrower of the general details thereof and grant to Bank in such writing a security interest therein and in the proceeds thereof, all upon the terms of this Agreement, with such writing to be in form and substance reasonably satisfactory to Bank.

  • Maturity of the Funding Agreement Upon the maturity of the Funding Agreement and the return of funds thereunder, the Trust hereby directs the Indenture Trustee to set aside from such funds an amount sufficient for the repayment of the outstanding principal on the Notes and Trust Beneficial Interest when due.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!