Security Protection. The Event Contractor agrees to provide adequate security for the event. No TDC funds will be used for this purpose.
Security Protection. The Seller shall provide security personnel, adequate security facilities and equipment for the protection and security of the Complex and the Site. The GOP shall ensure that the relevant law and order enforcement agencies shall extend security enforcement on a “non-discriminatory” basis to the Complex at no cost or expense to the Seller. From time to time, the Seller may request additional security forces from the GOP to meet unusual security requirements. All such additional security forces shall remain under the exclusive control and direction of the GOP. All reasonable out-of-pocket expenses incurred by the GOP in providing such security forces requested by the Seller shall be reimbursed to the GOP (through the AEDB) by the Seller within twenty one (21) Days of such expenditure having been notified by the AEDB, provided, however, that, in no event shall the Seller have an obligation to reimburse such expenses in excess of US$150,000 in any Year, which amount shall be increased by three percent (3%) per Year commencing with the Commercial Operations Date.
Security Protection. The Participant shall (i) utilize appropriate security protection, such as firewalls, as long as such requirement does not impose security obligations greater than those employed concurrently by the RLS or RLS-affiliated websites, and/or (ii) maintain an audit trail of Registrants’ activity on each Participant VOW and make that information available to REBNY if REBNY has reason to believe that a Participant VOW has caused or permitted a breach in the security of the data or a violation of this Agreement or the Co-Brokerage Agreement.
Security Protection. Regional distributor shall pay attention to the safety protection of its own online sales account, and shall take safety measures, for examples, selecting appropriate people to do account management, not to use such account in public places such as the net cafe, setup of appropriate password and modification of it on a regular basis;
Security Protection. You agree to implement appropriate security measures to protect the SDK and the API from unauthorized use by third parties. In the event of any such unauthorized access or use, you must promptly notify TVU and cooperate with TVU to mitigate the damage.
Security Protection. Notwithstanding Article 2.1, the contracting out protection shall extend to include protection for the following employees: Xxxxx Xxxxx Xxx Xxxxxx Xxxxxx Reniewick Xxxxxxx Xxxxxx Xxxxxxx XxXxxxxx Xxxx Xxxxxx Xxxxx Xxxxxx Xxxxx Xxxxxx Signed at Hamilton, Ontario, this day of , 2015 For the Employer: For the Union: XXXX X. XXXXX XXXXXXXX INTERNATIONAL AIRPORT CANADIAN UNION OF PUBLIC EMPLOYEES, AND ITS LOCAL 5167
Security Protection. The Seller shall provide security personnel for the protection and security of the Complex and the Site. The GOP shall ensure that the relevant law and order enforcement agencies shall extend security enforcement on a “non-discriminatory” basis to the Complex at no cost or expense to the Seller. From time to time, the Seller may request additional security forces from the GOP to meet unusual security requirements. All such additional security forces shall remain under the exclusive control and direction of the GOP. All reasonable out-of- pocket expenses incurred by the GOP in providing such security forces requested by the Seller shall be reimbursed to the GOP (through the AEDB) by the Seller within twenty one
Security Protection. Instinet shall be responsible for developing and maintaining physical security measures for the Data Center and for the Subscriber Cabinet that define specific requirements in regard to monitoring controls and procedures assigned for the security and safety of the Subscriber Systems and are consistent with customary industry standards. If at any time Instinet becomes aware that any of the security measures in place for any portion of the Data Center or any portion of the Subscriber Cabinet are compromised or otherwise violated or may be inadequate, Instinet shall provide notice of such event as soon as reasonably practicable to Subscriber in accordance with such notification and escalation call lists as Subscriber shall have, from time to time, provided to Instinet. In the event of a breach of the security measures, upon reasonable request, Instinet shall permit Subscriber to inspect the automatic security logs within twenty-four (24) hours following the receipt of such notice.
Security Protection. Lessee shall, not later than the date of first coal production, provide RGGS with security protection as hereinafter set forth which will guarantee to RGGS that all of Lessee’s or Lessee’s assigns’ obligations and liabilities to RGGS under this Lease shall be expeditiously kept and performed to the reasonable satisfaction of RGGS.
(a) Lessee shall provide RGGS with a standing irrevocable domestic Letter-of-Credit with a bank or banks acceptable to RGGS in an amount not less than Two Million Dollars ($2,000,000.00), including RGGS, its successors and assigns, as the sole beneficiary thereof.
(b) The form of Letter of Credit must be reasonably acceptable to RGGS, must be irrevocable as long as Lessee has Economically Mineable and Merchantable Coal remaining on the Premises, and must be immediately payable to RGGS upon demand by RGGS in the event Lessee should default on any monetary obligation to RGGS. Should RGGS withdraw any funds from the security provided by Lessee to satisfy a monetary obligation, Lessee agrees to replace the funds withdrawn within ten (10) days following receipt of written notice from RGGS that funds have been withdrawn. Each year on the anniversary of the Lease, the amount of security available in the Letter of Credit required may be adjusted upward or downward upon written notice from RGGS so that it shall equal the average of the three highest monthly royalty payments during the previous year rounded upward to the next higher Ten Thousand Dollar ($10,000) increment. Upon receiving a written notice from RGGS of an adjustment to the amount of security required, Lessee shall have Thirty (30) days to provide said adjusted security to RGGS.
Security Protection. Subhosting shall be responsible for developing and maintaining physical security measures for the Data Center and for the Customer’s Systems that define specific requirements in regard to monitoring controls and procedures assigned for the security and safety of the Customer Systems and are consistent with customary industry standards. If at any time Subhosting becomes aware that any of the security measures in place for any portion of the Data Center or any portion of the Customer’s Systems are compromised or otherwise violated or may be inadequate, Subhosting shall provide notice of such event as soon as reasonably practicable to Customer in accordance with such notification and escalation call lists as Customer shall have, from time to time, provided to Subhosting. In the event of a breach of the security measures, upon reasonable request, Subhosting shall permit Customer to inspect the automatic security logs within twenty-four (24) hours following the receipt of such notice.