The Security Providers Sample Clauses

The Security Providers. (a) It is incorporated or organized under the laws of the jurisdiction as set forth in Schedule 1 (Security Providers’ Information) hereto. (b) Its exact legal name, as it appears in the public records of its jurisdiction of incorporation or organization is as set forth in Schedule 1 (Security Providers’ Information) hereto. It has not changed its name, whether by amendment of its organizational documents, reorganization, merger or otherwise, since the date as set forth in Schedule 1 (Security Providers’ Information) hereto.
AutoNDA by SimpleDocs
The Security Providers. (a) Each Security Provider must not (i) change the jurisdiction of its incorporation or organization, nor (ii) change its name without, in each case, providing the Security Agent with 30 days’ prior written notice. (b) Subject to applicable law, each Security Provider permits the Security Agent and its agents and representatives, during normal business hours and upon reasonable notice, to inspect the Collateral, to examine and make copies of and abstracts from its books and records pertaining to the Collateral, and to discuss matters relating to the Collateral directly with such Security Provider’s officers and employees. (c) At the Security Agent’s request, each Security Provider must provide the Security Agent with any information concerning the Collateral that the Security Agent may reasonably request.
The Security Providers. Sharpower New Energy is a company established in the PRC and is holding 100% equity interest in the Lessee, whose principal business is the investment in wind power, photovoltaic and related technology services. Sharpower Technology is a company established in the PRC and is holding 100% equity interest in Sharpower New Energy, whose principal business is the investment in, development and operation of power station (especially in the new energy industry) and supplying wind power equipment.
The Security Providers. Gorun Energy is a company incorporated in the PRC with limited liability and is principally engaged in engineering, procurement construction, investment and development of new energy and related technology and equipments.
The Security Providers. Anhui Pacific is a company incorporated in the PRC with limited liability and is principally engaged in cable research and development, production and sales. As at the date of the announcement, Anhui Pacific is the largest downstream customer of the Lessee.
The Security Providers. Shenzhen Daotong is a company incorporated in the PRC with limited liability and is principally engaged in industrial investment and logistics. As at the date of the announcement, Shenzhen Daotong holds approximately 97.69% of the equity interest of the Lessee.
The Security Providers. (a) Each Security Provider must preserve its corporate existence and will not, in one transaction or a series of related transactions, merge into or consolidate with any other entity, or sell all or substantially all of its assets. (b) No Security Provider may change the jurisdiction of its incorporation or organization. (c) No Security Provider may change its name without providing the Security Trustee with 30 days’ prior written notice. (d) Each Security Provider must keep at its address indicated in Clause 18 (Notices) its corporate records and all records, documents and instruments constituting, relating to or evidencing Collateral. (e) Each Security Provider permits the Security Trustee and its agents and representatives, during normal business hours and upon reasonable notice, to inspect the Collateral, to examine and make copies of and abstracts from the records referred to in paragraph (d) above, and to discuss matters relating to the Collateral directly with each Security Provider’s officers and employees. (f) At the Security Trustee’s request, each Security Provider must provide the Security Trustee with any information concerning the Collateral that the Security Trustee may reasonably request.
AutoNDA by SimpleDocs

Related to The Security Providers

  • The Security Documents (a) None of the Collateral is subject to any Liens except Permitted Liens. (b) The security interests created under the Share Charge in favor of the Collateral Agent, as pledgee, for the benefit of the Secured Creditors, constitute perfected security interests in the Share Charge Collateral described in the Share Charge, subject to no security interests of any other Person. No filings or recordings are required in order to perfect (or maintain the perfection or priority of) the security interests created in the Share Charge Collateral under the Share Charge other than with respect to that portion of the Share Charge Collateral constituting a “general intangible” under the UCC. The filings on Form UCC-1 made pursuant to the Share Charge will perfect a security interest in the Collateral covered by the Share Charge to the extent a security interest in such Collateral may be perfected by such filings. (c) After the execution and registration thereof, the Vessel Mortgage will create, as security for the obligations purported to be secured thereby, a valid and enforceable perfected security interest in and mortgage lien on the Vessel in favor of the Collateral Agent (or such other trustee as may be required or desired under local law) for the benefit of the Secured Creditors, superior and prior to the rights of all third Persons (except that the security interest and mortgage lien created on the Vessel may be subject to the Permitted Liens related thereto) and subject to no other Liens (other than Permitted Liens related thereto). (d) After the execution and delivery thereof and upon the taking of the actions mentioned in the immediately succeeding sentence, each of the Security Documents will create in favor of the Collateral Agent for the benefit of the Secured Creditors a legal, valid and enforceable fully perfected first priority security interest in and Lien on all right, title and interest of the Credit Parties party thereto in the Collateral described therein, subject only to Permitted Liens. Subject to Sections 7.02, 8.04 and this Section 8.11 and the definition of “Collateral and Guaranty Requirements,” no filings or recordings are required in order to perfect the security interests created under any Security Document except for filings or recordings which shall have been made on or prior to the execution of such Security Document.

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • The Security Agreement The security interest granted pursuant to this Trademark Security Agreement is granted in conjunction with the security interest granted to the Collateral Agent pursuant to the Security Agreement and Grantor hereby acknowledges and affirms that the rights and remedies of the Collateral Agent with respect to the security interest in the Trademarks made and granted hereby are more fully set forth in the Security Agreement. In the event that any provision of this Trademark Security Agreement is deemed to conflict with the Security Agreement, the provisions of the Security Agreement shall control unless the Collateral Agent shall otherwise determine.

  • The Security Interests In order to secure the full and punctual observance and performance of the covenants and agreements of Pledgor contained herein and in the Securities Contract: (a) Pledgor hereby assigns and pledges to Secured Party, and grants to Secured Party, security interests in and to, and a lien upon and right of set-off against, and transfers to Secured Party, as and by way of a security interest having priority over all other security interests, with power of sale, all of Pledgor's right, title and interest in and to (i) the Initial Pledged Items; (ii) all additions to and substitutions for the Initial Pledged Items (including, without limitation, any securities, instruments or other property delivered or pledged pursuant to Section 4(a), 5(b) or 5(j)) (such additions and substitutions, the "Additions and Substitutions"); (iii) all income, proceeds and collections received or to be received, or derived or to be derived, now or any time hereafter (whether before or after the commencement of any proceeding under applicable bankruptcy, insolvency or similar law, by or against Pledgor, with respect to Pledgor) from or in connection with the Initial Pledged Items or the Additions and Substitutions (excluding Ordinary Cash Dividends but including, without limitation, (A) any shares of capital stock issued by the Issuer in respect of any Common Stock constituting Collateral or any cash, securities or other property distributed in respect of or exchanged for any Common Stock or Government Securities constituting Collateral (other than Ordinary Cash Dividends), or into which any such Common Stock is converted in connection with any Reorganization Event or otherwise, and any security entitlements in respect of any of the foregoing, (B) any obligation of Secured Party to return any rehypothecated Collateral pursuant to Section 5(i) and (C) any amounts paid or assets delivered to Pledgor by Secured Party in respect of dividends paid or distributions (other than Ordinary Cash Dividends) made on shares of Common Stock constituting Collateral that have been rehypothecated in accordance with Section 5(i)); (iv) the Collateral Account and all securities and other financial assets (each as defined in Section 8-102 of the UCC), including the Initial Pledged Items and the Additions and Substitutions, and other funds, property or assets from time to time held therein or credited thereto; and (v) all powers and rights now owned or hereafter acquired under or with respect to the Initial Pledged Items or the Additions and Substitutions (such Initial Pledged Items, Additions and Substitutions, proceeds, collections, powers, rights, Collateral Account and assets held therein or credited thereto being herein collectively called the "Collateral"). Secured Party shall have all of the rights, remedies and recourses with respect to the Collateral afforded a secured party by the UCC, in addition to, and not in limitation of, the other rights, remedies and recourses afforded to Secured Party by this Agreement. (b) Immediately upon payment of the Purchase Price, Pledgor shall deliver to the Custodian in pledge hereunder Eligible Collateral consisting of a number of shares of Common Stock equal to the Base Amount as of the Closing Date (the "Initial Pledged Items"), in the manner provided in Section 5(c). Upon delivery of the Purchase Price, Pledgor shall cause to be delivered to Secured Party any documents as Secured Party may reasonably request to evidence that the Initial Pledged Items have been delivered free and clear from any Lien or Transfer Restrictions to which such Initial Pledged Items may have been subject prior to the delivery of the Purchase Price. (c) In the event that the Issuer at any time issues in respect of any Common Stock constituting Collateral hereunder, or comprising financial assets underlying security entitlements constituting Collateral hereunder, any additional or substitute shares of capital stock of any class, Pledgor shall immediately pledge and deliver to Secured Party in accordance with Section 5(c) all such shares or security entitlements in respect thereof as additional Collateral hereunder. (d) The Security Interests are granted as security only and shall not subject Secured Party to, or transfer or in any way affect or modify, any obligation or liability of Pledgor or the Issuer with respect to any of the Collateral or any transaction in connection therewith. (e) The parties hereto expressly agree that all rights, assets and property at any time held in or credited to the Collateral Account shall be treated as financial assets (as defined in Section 8-102 of the UCC).

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Indemnity to the Security Agent (a) Each Obligor shall, on demand, indemnify the Security Agent and every Receiver and Delegate against any cost, loss or liability incurred by any of them: (i) in relation to or as a result of: (A) acting or relying on any notice, request or instruction which it reasonably believes to be genuine, correct and appropriately authorised; (B) the taking, holding, protection or enforcement of the Finance Documents and the Transaction Security; (C) the exercise of any of the rights, powers, discretions, authorities and remedies vested in the Security Agent and each Receiver and Delegate by the Finance Documents or by law; (D) any default by any Transaction Obligor in the performance of any of the obligations expressed to be assumed by it in the Finance Documents; (E) any action by any Obligor which vitiates, reduces the value of, or is otherwise prejudicial to, the Transaction Security; and (F) instructing lawyers, accountants, tax advisers, surveyors or other professional advisers or experts as permitted under the Finance Documents. (ii) acting as Security Agent, Receiver or Delegate under the Finance Documents or which otherwise relates to any of the Security Property or the performance of the terms of this Agreement or the other Finance Documents (otherwise, in each case, than by reason of the relevant Security Agent’s, Receiver’s or Delegate’s gross negligence or wilful misconduct). (b) The Security Agent and every Receiver and Delegate may, in priority to any payment to the Secured Parties, indemnify itself out of the Charged Property in respect of, and pay and retain, all sums necessary to give effect to the indemnity in this Clause 14.6 (Indemnity to the Security Agent) and shall have a lien on the Transaction Security and the proceeds of the enforcement of the Transaction Security for all monies payable to it.

  • Third Party Providers Except for those terms and conditions that specifically apply to Third Party Providers, under no circumstances shall any other person be considered a third party beneficiary of this Agreement or otherwise entitled to any rights or remedies under this Agreement. Except as may be provided in Third Party Agreements, Company shall have no rights or remedies against Third Party Providers, Third Party Providers shall have no liability of any nature to the Company, and the aggregate cumulative liability of all Third Party Providers to the Company shall be $1.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • The Security The Obligations will be secured by the Security Documents described in Schedule 4.01 and any additional Security Documents hereafter delivered by the Loan Parties and accepted by the Administrative Agent.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!