Xxxxx of U.S. Security Sample Clauses

Xxxxx of U.S. Security. Each U.S. Grantor (as defined in the U.S. Guarantee and Collateral Agreement) (other than Holding) hereby grants, subject to existing licenses to use the Copyrights, Patents, Trademarks and Trade Secrets (each as defined in the U.S. Guarantee and Collateral Agreement) granted by such U.S. Grantor in the ordinary course of business, to the ABL Collateral Agent, for the benefit of the Secured Parties (as defined in the U.S. Guarantee and Collateral Agreement), a security interest in all of the Collateral (as defined in the U.S. Guarantee and Collateral Agreement) of such U.S. Grantor, as collateral security for the prompt and complete payment and performance when due (whether at the stated maturity (as extended by this Amendment), by acceleration or otherwise) of the Obligations (as defined in the U.S. Guarantee and Collateral Agreement) of such U.S. Grantor, except as provided in Section 3.3 of the U.S. Guarantee and Collateral Agreement.
AutoNDA by SimpleDocs

Related to Xxxxx of U.S. Security

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Quebec Security To the extent that any Canadian Credit Party now or in the future is required to grant security pursuant to the laws of the Province of Quebec, each Agent (other than the Collateral Agent) and Lender acting for itself and on behalf of all present and future Affiliates of such Agent or Lender that are or become a Lender Counterparty, hereby irrevocably authorizes and appoints the Collateral Agent to act as the holder of an irrevocable power of attorney (fondé de pouvoir) (within the meaning of Article 2692 of the Civil Code of Quebec) in order to hold any hypothec granted under the laws of the Province of Quebec as security for any debenture, bond or other title of indebtedness that may be issued by any Canadian Credit Party and to exercise such rights and duties as are conferred upon a fondé de pouvoir under the relevant deed of hypothec and applicable laws (with the power to delegate any such rights or duties). Moreover, in respect of any pledge by any such Canadian Credit Party of any such debenture, bond or other title of indebtedness as security in respect of any Obligations, the Collateral Agent shall also be authorized to hold such debenture, bond or other title of indebtedness as agent, mandatary, custodian and pledgee for the benefit of the Agents, the Lenders and the Lender Counterparties, the whole notwithstanding the provisions of Section 32 of the An Act respecting the Special Powers of Legal Persons (Quebec). The execution prior to the date hereof by the Collateral Agent of any deed of hypothec or other security documents made pursuant to the laws of the Province of Quebec, is hereby ratified and confirmed. Any person who becomes a Lender, Issuing Bank, an Agent or a Lender Counterparty shall be deemed to have consented to and ratified the foregoing appointment of each of the Collateral Agent as fondé de pouvoir, agent, mandatary and custodian on behalf of all Agents, Issuing Banks, Lenders and the Lender Counterparties, including such person. For greater certainty, the Collateral Agent, when acting as the holder of an irrevocable power of attorney (fondé de pouvoir), shall have the same rights, powers, immunities, indemnities and exclusions from liability as are prescribed in favour of the Collateral Agent in this Agreement, which shall apply mutatis mutandis. In the event of the resignation and appointment of a successor Collateral Agent, such successor of the Collateral Agent shall also act as the holder of an irrevocable power of attorney (fondé de pouvoir), and as agent, mandatary and custodian for the purposes set forth above. Without limiting the foregoing, none of such Lenders shall have or be deemed to have a fiduciary relationship with any Lender. The Lenders are not partners or co-venturers, and no Lender shall be liable for the acts or omissions of, or (except as otherwise set forth herein in case of the Administrative Agent) authorized to act for, any other Lender.

  • Data Security A. Identity Access Management. BNY Mellon will implement reasonable and industry recognized user access rules for users accessing Customer Data based on the need to know and the principle of least privilege, and including user ID and password requirements, session timeout and re-authentication requirements, unsuccessful login attempt limits, privileged access limits and multifactor authentication or equivalent safeguard where risk factors indicate that single factor authentication is inadequate.

  • Protection of Collateral Agent’s Security On a continuing basis, each Pledgor shall, at its sole cost and expense, (i) promptly following its becoming aware thereof, notify the Collateral Agent of any adverse determination in any proceeding or the institution of any proceeding in any federal, state or local court or administrative body or in the United States Patent and Trademark Office or the United States Copyright Office regarding any Material Intellectual Property Collateral, such Pledgor’s right to register such Material Intellectual Property Collateral or its right to keep and maintain such registration in full force and effect, (ii) maintain all Material Intellectual Property Collateral as presently used and operated, (iii) not permit to lapse or become abandoned any Material Intellectual Property Collateral, and not settle or compromise any pending or future litigation or administrative proceeding with respect to any such Material Intellectual Property Collateral, in either case except as shall be consistent with commercially reasonable business judgment, (iv) upon such Pledgor obtaining knowledge thereof, promptly notify the Collateral Agent in writing of any event which may be reasonably expected to materially and adversely affect the value or utility of any Material Intellectual Property Collateral or the rights and remedies of the Collateral Agent in relation thereto including a levy or threat of levy or any legal process against any Material Intellectual Property Collateral, (v) not license any Intellectual Property Collateral other than licenses entered into by such Pledgor in, or incidental to, the ordinary course of business, or amend or permit the amendment of any of the licenses in a manner that materially and adversely affects the right to receive payments thereunder, or in any manner that would materially impair the value of any Intellectual Property Collateral or the Lien on and security interest in the Intellectual Property Collateral created therein hereby, without the consent of the Collateral Agent, (vi) diligently keep adequate records respecting all Intellectual Property Collateral and (vii) furnish to the Collateral Agent from time to time upon the Collateral Agent’s request therefor reasonably detailed statements and amended schedules further identifying and describing the Intellectual Property Collateral and such other materials evidencing or reports pertaining to any Intellectual Property Collateral as the Collateral Agent may from time to time request.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • Security Agreement under Uniform Commercial Code (a) It is the intention of the parties hereto that this Mortgage shall constitute a Security Agreement within the meaning of the Uniform Commercial Code (the “Code”) of the State in which the Mortgaged Property is located. If an Event of Default shall occur and be continuing under this Mortgage, then in addition to having any other right or remedy available at law or in equity, Mortgagee shall have the option of either (i) proceeding under the Code and exercising such rights and remedies as may be provided to a secured party by the Code with respect to all or any portion of the Mortgaged Property which is personal property (including, without limitation, taking possession of and selling such property) or (ii) treating such property as real property and proceeding with respect to both the real and personal property constituting the Mortgaged Property in accordance with Mortgagee’s rights, powers and remedies with respect to the real property (in which event the default provisions of the Code shall not apply). If Mortgagee shall elect to proceed under the Code, then ten days’ notice of sale of the personal property shall be deemed reasonable notice and the reasonable expenses of retaking, holding, preparing for sale, selling and the like incurred by Mortgagee shall include, but not be limited to, reasonable attorneys’ fees and legal expenses. At Mortgagee’s request, Mortgagor shall assemble the personal property and make it available to Mortgagee at a place designated by Mortgagee which is reasonably convenient to both parties.

  • Data Privacy and Security Bank will implement and maintain a written information security program, in compliance with all federal, state and local laws and regulations (including any similar international laws) applicable to Bank, that contains reasonable and appropriate security measures designed to safeguard the personal information of the Funds' shareholders, employees, trustees and/or officers that Bank or any Subcustodian receives, stores, maintains, processes, transmits or otherwise accesses in connection with the provision of services hereunder. In this regard, Bank will establish and maintain policies, procedures, and technical, physical, and administrative safeguards, designed to (i) ensure the security and confidentiality of all personal information and any other confidential information that Bank receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder, (ii) protect against any reasonably foreseeable threats or hazards to the security or integrity of personal information or other confidential information, (iii) protect against unauthorized access to or use of personal information or other confidential information, (iv) maintain reasonable procedures to detect and respond to any internal or external security breaches, and (v) ensure appropriate disposal of personal information or other confidential information. Bank will monitor and review its information security program and revise it, as necessary and in its sole discretion, to ensure it appropriately addresses any applicable legal and regulatory requirements. Bank shall periodically test and review its information security program. Bank shall respond to Customer's reasonable requests for information concerning Bank's information security program and, upon request, Bank will provide a copy of its applicable policies and procedures, or in Bank's discretion, summaries thereof, to Customer, to the extent Bank is able to do so without divulging information Bank reasonably believes to be proprietary or Bank confidential information. Upon reasonable request, Bank shall discuss with Customer the information security program of Bank. Bank also agrees, upon reasonable request, to complete any security questionnaire provided by Customer to the extent Bank is able to do so without divulging sensitive, proprietary, or Bank confidential information and return it in a commercially reasonable period of time (or provide an alternative response that reasonably addresses the points included in the questionnaire). Customer acknowledges that certain information provided by Bank, including internal policies and procedures, may be proprietary to Bank, and agrees to protect the confidentiality of all such materials it receives from Bank. Bank agrees to resolve promptly any applicable control deficiencies that come to its attention that do not meet the standards established by federal and state privacy and data security laws, rules, regulations, and/or generally accepted industry standards related to Bank's information security program. Bank shall: (i) promptly notify Customer of any confirmed unauthorized access to personal information or other confidential information of Customer ("Breach of Security"); (ii) promptly furnish to Customer appropriate details of such Breach of Security and assist Customer in assessing the Breach of Security to the extent it is not privileged information or part of an investigation; (iii) reasonably cooperate with Customer in any litigation and investigation of third parties reasonably deemed necessary by Customer to protect its proprietary and other rights; (iv) use reasonable precautions to prevent a recurrence of a Breach of Security; and (v) take all reasonable and appropriate action to mitigate any potential harm related to a Breach of Security, including any reasonable steps requested by Customer that are practicable for Bank to implement. Nothing in the immediately preceding sentence shall obligate Bank to provide Customer with information regarding any of Bank's other customers or clients that are affected by a Breach of Security, nor shall the immediately preceding sentence limit Bank's ability to take any actions that Bank believes are appropriate to remediate any Breach of Security unless such actions would prejudice or otherwise limit Customer's ability to bring its own claims or actions against third parties related to the Breach of Security. If Bank discovers or becomes aware of a suspected data or security breach that may involve an improper access, use, disclosure, or alteration of personal information or other confidential information of Customer, Bank shall, except to the extent prohibited by Applicable Law or directed otherwise by a governmental authority not to do so, promptly notify Customer that it is investigating a potential breach and keep Customer informed as reasonably practicable of material developments relating to the investigation until Bank either confirms that such a breach has occurred (in which case the first sentence of this paragraph will apply) or confirms that no data or security breach involving personal information or other confidential information of Customer has occurred. For these purposes, "personal information" shall mean (i) an individual's name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver's license number, (c) state identification card number, (d) debit or credit card number, (e) financial account 22 number, (f) passport number, or (g) personal identification number or password that would permit access to a person's account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual's account. This provision will survive termination or expiration of the Agreement for so long as Bank or any Subcustodian continues to possess or have access to personal information related to Customer. Notwithstanding the foregoing "personal information" shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Time is Money Join Law Insider Premium to draft better contracts faster.