SECURITY VALIDATION Sample Clauses

SECURITY VALIDATION. Validate complete WiMAX end-2-end IP assignment flow [***]
AutoNDA by SimpleDocs
SECURITY VALIDATION. 25 8. [*]..................................................................... 25 8.1 [*]................................................................. 26 ---------- * CONFIDENTIAL TREATMENT REQUESTED. CONFIDENTIAL PORTION HAS BEEN FILED WITH THE SECURITIES AND EXCHANGE COMMISSION.
SECURITY VALIDATION. Throughout the term hereof, InterTrust and NatWest ------------------- will reasonably cooperate and work together to maintain, enhance and promote the robustness of the security aspects of InterTrust Technology and NatWest Products and associated services, as reasonably determined by InterTrust and/or NatWest with respect to its technology, products or services, as applicable, and taking into account and balancing relevant interests such as commercial feasibility and desirability, the varying nature of applications and implementations of NatWest Products, regulatory and governmental restrictions, and overall commercial use of InterTrust Technology by NatWest. InterTrust agrees to use commercially reasonable, practical and affordable efforts with respect to InterTrust Technology, and NatWest agrees to use commercially reasonable, practical and affordable efforts with respect to NatWest Products, to establish and perform or have performed, security testing procedures and practices, including use of appropriate, circumscribed, third party "tiger testing." The Parties will further discuss and work together to consider, where (and as) practical, affordable and appropriate, obtaining validation and/or certification for appropriate portions of the respective Party's security related technologies and/or services from one or more relevant and appropriate third parties or organizations. Each Party agrees to share with the other relevant aspects of test results for, and/or identified security breaches of, InterTrust Technology and NatWest Products where practical, subject to confidentiality obligations, requirements of law, and appropriate security practices.

Related to SECURITY VALIDATION

  • Validation To validate the notice requirements outlined in Section 5.3, the Assuming Institution shall provide the Receiver (i) an Affidavit of Publication to meet the publication requirements outlined in Section 5.3(a) and (ii) the Assuming Institution will prepare an Affidavit of Mailing in a form substantially similar to Exhibit 2.3B after mailing the seven (7) day Notice to Depositors as required under Section 5.3(b).

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Location and Type of Mortgaged Property The Mortgaged Property is a fee simple property located in the state identified in the Mortgage Loan Schedule and consists of a single parcel of real property with a detached single family residence erected thereon, or a two- to four-family dwelling, or an individual residential condominium unit in a condominium project, or an individual unit in a planned unit development and that no residence or dwelling is a mobile home, provided, however, that any condominium unit or planned unit development shall not fall within any of the "Ineligible Projects" of part VIII, Section 102 of the Fannie Mae Selling Guide and shall conform with the Underwriting Xxxxxxixxx. In the case of any Mortgaged Properties that are Manufactured Homes (a "Manufactured Home Mortgage Loans"), (i) the related manufactured dwelling is permanently affixed to the land, (ii) the related manufactured dwelling and the related land are subject to a Mortgage properly filed in the appropriate public recording office and naming Seller as mortgagee, (iii) the applicable laws of the jurisdiction in which the related Mortgaged Property is located will deem the manufactured dwelling located on such Mortgaged Property to be a part of the real property on which such dwelling is located, (iv) as of the origination date of such Manufactured Home Mortgage Loan, the related Mortgagor occupied the related manufactured dwelling as its primary residence; and (v) such Manufactured Home Mortgage Loan is (x) a qualified mortgage under Section 860G(a)(3) of the Internal Revenue Code of 1986, as amended and (y) secured by manufactured housing treated as a single family residence under Section 25(e)(10) of the Code. As of the date of origination, no portion of the Mortgaged Property was used for commercial purposes, and since the date of origination, no portion of the Mortgaged Property has been used for commercial purposes; provided, that Mortgaged Properties which contain a home office shall not be considered as being used for commercial purposes as long as the Mortgaged Property has not been altered for commercial purposes and is not storing any chemicals or raw materials other than those commonly used for homeowner repair, maintenance and/or household purposes. This representation and warranty is a Deemed Material and Adverse Representation;

  • Traceability Distributor agrees to maintain access to records allowing Micrus the ability to determine all customers who were shipped specific product lots. Product Identification and traceability requirements are defined in ISO 9001 : 1994 (E) requirement 4.8 as : “...the supplier shall maintain documented procedures for identifying the product from production, delivery and installation.” Traceability in ISO 8402 Vocabulary is defined as : “ability to trace the distribution and location of the product after delivery”.

  • Maintenance of Status The Borrower will maintain its separate corporate existence and remain in good standing under the laws of the Xxxxxxxx Islands.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Maintenance of Security Interests The Borrower will:

  • Maintenance of Security Interest (a) Such U.S. Pledgor shall maintain the security interest created by this Agreement in such U.S. Pledgor’s Pledged Collateral as a security interest having at least the perfection and priority described in subsection 4.3.4 or subsection 4.3.5, as applicable and shall defend such security interest against the claims and demands of all Persons whomsoever. At any time and from time to time, upon the written request of the ABL Collateral Agent and at the sole expense of such U.S. Pledgor, such U.S. Pledgor will promptly and duly execute and deliver such further instruments and documents and take such further actions as the ABL Collateral Agent may reasonably request for the purpose of obtaining or preserving the full benefits of this Agreement and of the rights and powers herein granted by such U.S. Pledgor; provided, that notwithstanding any other provision of this Agreement or any other Loan Documents, neither the Parent Borrower nor any other U.S. Pledgor will be required to (i) take any action in any jurisdiction other than the United States of America, or required by the laws of any such non-U.S. jurisdiction, or enter into any security agreement or pledge agreement governed by the laws of any such non-U.S. jurisdiction, in order to create any security interests (or other Liens) in assets located or titled outside of the United States of America or to perfect any security interests (or other Liens) in any Collateral, (ii) deliver control agreements with respect to, or confer perfection by “control” over, any deposit accounts, bank or securities account or other Collateral, except (A) as required by subsection 4.16 of the ABL Credit Agreement and (B) in the case of Security Collateral that constitutes Capital Stock or Pledged Notes in certificated form, delivering such Capital Stock or Pledged Notes to the ABL Collateral Agent (or another Person as required under any applicable Intercreditor Agreement), (iii) take any action in order to perfect any security interests in any assets specifically requiring perfection through control (including cash, cash equivalents, deposit accounts or securities accounts) constituting Excluded Assets (except, in each case, to the extent consisting of proceeds perfected by the filing of a financing statement under the Code or, in the case of Pledged Stock, by being held by the ABL Collateral Agent or an Additional Agent as agent for the ABL Collateral Agent), (iv) deliver landlord lien waivers, estoppels or collateral access letters or (v) file any fixture filing with respect to any security interest in Fixtures affixed to or attached to any real property constituting Excluded Assets.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Maintenance of Intellectual Property The Company will, and will cause each of its Subsidiaries to, take all reasonable action necessary or advisable to maintain all of the Intellectual Property Rights of the Company and/or any of its Subsidiaries that are necessary or material to the conduct of its business in full force and effect.

Time is Money Join Law Insider Premium to draft better contracts faster.