NOTE For Community-‐Based TLDs Only] Obligations of Registry Operator to TLD Community. Registry Operator shall establish registration policies in conformity with the application submitted with respect to the TLD for: (i) naming conventions within the TLD, (ii) requirements for registration by members of the TLD community, and (iii) use of registered domain names in conformity with the stated purpose of the community-‐based TLD. Registry Operator shall operate the TLD in a manner that allows the TLD community to discuss and participate in the development and modification of policies and practices for the TLD. Registry Operator shall establish procedures for the enforcement of registration policies for the TLD, and resolution of disputes concerning compliance with TLD registration policies, and shall enforce such registration policies. Registry Operator agrees to implement and be bound by the Registry Restrictions Dispute Resolution Procedure as set forth at [insert applicable URL] with respect to disputes arising pursuant to this Section 2.19. Registry Operator shall implement and comply with the community registration policies set forth on Specification 12 attached hereto.]
Covenant to Secure Notes Equally The Company covenants that, if it or any Subsidiary shall create or assume any Lien upon any of its property or assets, whether now owned or hereafter acquired, other than Liens permitted by the provisions of paragraph 6B(1) (unless the prior written consent to the creation or assumption thereof shall have been obtained pursuant to paragraph 11C), it will make or cause to be made effective provision whereby the Notes will be secured by such Lien equally and ratably with any and all other Debt thereby secured so long as any such other Debt shall be so secured.
PLEASE NOTE Retail clinics located in retail stores, supermarkets and pharmacies are not considered urgent care centers. The amount you pay for services at a retail based clinic differs from the amount you pay for urgent care services. See the Summary of Medical Benefits for details.
Convertible Note 9 Section 3.8
Supplier Note Thank you for the opportunity
Subordinated Notes The Subordinated Notes have been duly authorized by the Company and when executed by the Company and issued, delivered to and paid for by the Purchasers in accordance with the terms of the Agreement, will have been duly executed, authenticated, issued and delivered, and will constitute legal, valid and binding obligations of the Company and enforceable in accordance with their terms, except as enforcement thereof may be limited by bankruptcy, insolvency, reorganization, moratorium or other similar laws relating to or affecting creditors’ rights generally or by general equitable principles.
System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.
Initial Note A-3 Holder (Prior to Securitization of Note A-3): Following Securitization of Note A-3 the applicable notice addresses set forth in the related Securitization Servicing Agreement.
Additional Secured Parties The benefit of the provisions of the Loan Documents directly relating to the Collateral or any Lien granted thereunder shall extend to and be available to any Secured Party that is not a Lender or L/C Issuer party hereto as long as, by accepting such benefits, such Secured Party agrees, as among Agent and all other Secured Parties, that such Secured Party is bound by (and, if requested by Agent, shall confirm such agreement in a writing in form and substance acceptable to Agent) this Article VIII, Section 9.3, Section 9.9, Section 9.10, Section 9.11, Section 9.17, Section 9.24 and Section 10.1 (and, solely with respect to L/C Issuers, Section 1.1(c)) and the decisions and actions of Agent and the Required Lenders (or, where expressly required by the terms of this Agreement, a greater proportion of the Lenders or other parties hereto as required herein) to the same extent a Lender is bound; provided, however, that, notwithstanding the foregoing, (a) such Secured Party shall be bound by Section 8.8 only to the extent of Liabilities, costs and expenses with respect to or otherwise relating to the Collateral held for the benefit of such Secured Party, in which case the obligations of such Secured Party thereunder shall not be limited by any concept of pro rata share or similar concept, (b) each of Agent, the Lenders and the L/C Issuers party hereto shall be entitled to act at its sole discretion, without regard to the interest of such Secured Party, regardless of whether any Obligation to such Secured Party thereafter remains outstanding, is deprived of the benefit of the Collateral, becomes unsecured or is otherwise affected or put in jeopardy thereby, and without any duty or liability to such Secured Party or any such Obligation and (c) except as otherwise set forth herein, such Secured Party shall not have any right to be notified of, consent to, direct, require or be heard with respect to, any action taken or omitted in respect of the Collateral or under any Loan Document.
Default Not Exceeding 10% of Firm Securities or Option Securities If any Underwriter or Underwriters shall default in its or their obligations to purchase the Firm Securities or the Option Securities, if the Over-allotment Option is exercised hereunder, and if the number of the Firm Securities or Option Securities with respect to which such default relates does not exceed in the aggregate 10% of the number of Firm Securities or Option Securities that all Underwriters have agreed to purchase hereunder, then such Firm Securities or Option Securities to which the default relates shall be purchased by the non-defaulting Underwriters in proportion to their respective commitments hereunder.