The Security Documents (a) None of the Collateral is subject to any Liens except Permitted Liens. (b) The security interests created under the Share Charge in favor of the Collateral Agent, as pledgee, for the benefit of the Secured Creditors, constitute perfected security interests in the Share Charge Collateral described in the Share Charge, subject to no security interests of any other Person. No filings or recordings are required in order to perfect (or maintain the perfection or priority of) the security interests created in the Share Charge Collateral under the Share Charge other than with respect to that portion of the Share Charge Collateral constituting a “general intangible” under the UCC. The filings on Form UCC-1 made pursuant to the Share Charge will perfect a security interest in the Collateral covered by the Share Charge to the extent a security interest in such Collateral may be perfected by such filings. (c) After the execution and registration thereof, the Vessel Mortgage will create, as security for the obligations purported to be secured thereby, a valid and enforceable perfected security interest in and mortgage lien on the Vessel in favor of the Collateral Agent (or such other trustee as may be required or desired under local law) for the benefit of the Secured Creditors, superior and prior to the rights of all third Persons (except that the security interest and mortgage lien created on the Vessel may be subject to the Permitted Liens related thereto) and subject to no other Liens (other than Permitted Liens related thereto). (d) After the execution and delivery thereof and upon the taking of the actions mentioned in the immediately succeeding sentence, each of the Security Documents will create in favor of the Collateral Agent for the benefit of the Secured Creditors a legal, valid and enforceable fully perfected first priority security interest in and Lien on all right, title and interest of the Credit Parties party thereto in the Collateral described therein, subject only to Permitted Liens. Subject to Sections 7.02, 8.04 and this Section 8.11 and the definition of “Collateral and Guaranty Requirements,” no filings or recordings are required in order to perfect the security interests created under any Security Document except for filings or recordings which shall have been made on or prior to the execution of such Security Document.
Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.
The Security Agreement The security interest granted pursuant to this Trademark Security Agreement is granted in conjunction with the security interest granted to the Collateral Agent pursuant to the Security Agreement and Grantor hereby acknowledges and affirms that the rights and remedies of the Collateral Agent with respect to the security interest in the Trademarks made and granted hereby are more fully set forth in the Security Agreement. In the event that any provision of this Trademark Security Agreement is deemed to conflict with the Security Agreement, the provisions of the Security Agreement shall control unless the Collateral Agent shall otherwise determine.
Indemnity to the Security Agent (a) Each Obligor shall, on demand, indemnify the Security Agent and every Receiver and Delegate against any cost, loss or liability incurred by any of them: (i) in relation to or as a result of: (A) acting or relying on any notice, request or instruction which it reasonably believes to be genuine, correct and appropriately authorised; (B) the taking, holding, protection or enforcement of the Finance Documents and the Transaction Security; (C) the exercise of any of the rights, powers, discretions, authorities and remedies vested in the Security Agent and each Receiver and Delegate by the Finance Documents or by law; (D) any default by any Transaction Obligor in the performance of any of the obligations expressed to be assumed by it in the Finance Documents; (E) any action by any Obligor which vitiates, reduces the value of, or is otherwise prejudicial to, the Transaction Security; and (F) instructing lawyers, accountants, tax advisers, surveyors or other professional advisers or experts as permitted under the Finance Documents. (ii) acting as Security Agent, Receiver or Delegate under the Finance Documents or which otherwise relates to any of the Security Property or the performance of the terms of this Agreement or the other Finance Documents (otherwise, in each case, than by reason of the relevant Security Agent’s, Receiver’s or Delegate’s gross negligence or wilful misconduct). (b) The Security Agent and every Receiver and Delegate may, in priority to any payment to the Secured Parties, indemnify itself out of the Charged Property in respect of, and pay and retain, all sums necessary to give effect to the indemnity in this Clause 14.6 (Indemnity to the Security Agent) and shall have a lien on the Transaction Security and the proceeds of the enforcement of the Transaction Security for all monies payable to it.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.
The Security Trustee The Security Trustee has agreed to become a party to this Agreement for the better preservation and enforcement of its rights under this Agreement but shall have no responsibility for any of the obligations of, nor assume any liabilities to, the Cash Manager, the Account Banks, the Mortgages Trustee or Funding hereunder.
Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.
Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.
Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.
Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.