Security Status definition

Security Status. [Senior unsecured notes; not secured by any property or assets; notes rank equally with all other unsecured and unsubordinated indebtedness] Transaction Type: SEC Registered Currency: [U.S. Dollars] Total Principal Amount: U.S.$[●] Offering Price: [●]% plus accrued interest, if any, from [●] Gross Proceeds (excluding accrued interest): U.S.$[●] Trade Date: [●] Settlement: [●] [(T+3)] Maturity: [●] Coupon: [[●]% per annum] Benchmark Instrument: UST [●]% due [●] Benchmark Instrument Yield: [●]% Spread to Benchmark Instrument: [●] bps Yield to Maturity: [●]% Interest Rate Payment Frequency: [Semi-annual] Interest Payment Dates: [●] and [●], with first interest payment date on [●] Interest Rate Basis: [30/360] Redemption Provisions: Notes may not be redeemed prior to [●]
Security Status. Senior unsecured notes; not secured by any property or assets; notes rank equally with all other unsecured and unsubordinated indebtedness
Security Status means, as to any Loan, whether such Loan is a Secured Loan or an Unsecured Loan.

Examples of Security Status in a sentence

  • The market data Security Status (tag 35-MsgType=f) message is used to communicate the instrument status during the Velocity Logic event.

  • A Security Status (tag 35-MsgType=f) message is generated to notify the market of this state.

  • During the Pause state CME Globex cancels all options quotes.Market Reopens• The market reopens when the 2 minutes has elapsed.• The Security Status (tag 35-MsgType=f) message is generated.

  • This Note may be an Unsecured Note or a Secured Note, depending on the Security Status shown in the applicable Pricing Supplement.

  • Note: In the event that a Fill and Kill, Minimum Quantity, or Market order is determined by CME Globex to trigger Velocity Logic:• an Execution Report - Order Acknowledgment is sent• an Execution Report - Order Cancel is sent (tag 35-MsgType=8, tag 39-OrdStatus=4); Fill and Kill and Minimum Quantity order eliminated (tag 35-MsgType=8, tag 39-OrdStatus=C)• The market will remain openThe following examples describe the Velocity Logic event and the use of the Security Status message.

  • Tag Name 1.3.4 Security Status (tag 35=f)This message contains instrument or instrument group state and trading phase information.

  • The Product warning messages can be viewed on the Security Status / Alerts Tab.Warning: Battery Unplugged Detection: The battery will be automatically monitored to detect occurrences of the battery being unplugged.

  • Note: In the event that a Fill and Kill, Minimum Quantity, or Market order is determined by CME Globex to trigger Velocity Logic:• an Execution Report - Order Acknowledgment is sent• an Execution Report - Order Cancel is sent (tag 35-MsgType=8, tag 39-OrdStatus=4); Fill and Kill and Minimum Quantity order eliminated (tag 35-MsgType=8, tag 39-OrdStatus=C) • The market will remain openThe following examples describe the Velocity Logic event and the use of the Security Status message.

  • The Product warning messages can be viewed on the Security Status / Alerts Tab.Warning: Battery Life: Greater than 5 years with use of the Product according to specifications.

  • Customers are prohibited from applying an OS Modification to OB TraceVue prior to running an OS Modification through the third party validation tool for IntelliSpace Perinatal.Each month Philips tests the latest applicable security updates and publishes them as Philips Product Security Status documents.


More Definitions of Security Status

Security Status. Senior unsecured notes; not secured by any property or assets; notes rank equally with all other unsecured and unsubordinated indebtedness Transaction Type: SEC Registered Currency: U.S. Dollars (“USD”) Total Principal Amount: USD 1,750,000,000 Offering Price: 99.894% Gross Proceeds (excluding accrued interest): USD 1,748,145,000 Underwriting Discount: 0.100% Trade Date: October 19, 2023 Settlement: October 26, 2023 (T+5) Maturity: April 26, 2027 Coupon: 6.000% per annum, payable semi-annually Spread to SOFR Mid-Swap: 125 bps Benchmark Instrument: UST 4.625% due October 15, 2026 Benchmark Instrument Price/Yield: 98-29+ / 5.018% Spread to Benchmark Instrument: 101.6 bps Yield to Maturity: 6.034% Interest Payment Frequency: Semi-annual Interest Payment Dates: April 26 and October 26, commencing on April 26, 2024 Interest Rate Basis: 30/360 Business Day Convention: Modified Following, Unadjusted Redemption Provisions: Redeemable in whole, but not in part, for tax reasons Sinking Fund Provisions: No sinking fund provisions Form: Global note held by depositary or the depositary’s custodian Denominations: Denominations of USD 1,000.00 and integral multiples of USD 1,000.00 in excess thereof Clearing: DTC / Euroclear / Clearstream Joint Book—Running Managers: BofA Securities, Inc. Daiwa Capital Markets Europe Limited Xxxxxxx Xxxxx International HSBC Securities (USA) Inc. Names and Addresses of Representatives: BofA Securities, Inc. Xxx Xxxxxx Xxxx Xxx Xxxx, XX 00000 Xxxxxx Xxxxxx Daiwa Capital Markets Europe Limited 0 Xxxx Xxxxxxx Xxxxxx London EC4N 7AX United Kingdom Xxxxxxx Xxxxx International Plumtree Court 00 Xxxx Xxxx Xxxxxx XX0X 0XX Xxxxxx Xxxxxxx HSBC Securities (USA) Inc. 000 Xxxxx Xxxxxx Xxx Xxxx, XX 00000 Xxxxxx Xxxxxx Governing Law: New York Listing: Application will be made to admit the notes to the official list of the Financial Conduct Authority and to the regulated market of the London Stock Exchange CUSIP/ISIN: CUSIP: 000000XX0 ISIN: US219868CH71

Related to Security Status

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Highly restricted personal information means an individual’s photograph or image, social security number, digitized signature, and medical and disability information.

  • Security freeze means a notice, at the request of the consumer and subject to certain exceptions,

  • Prior Security Interest means a valid and enforceable perfected first-priority security interest in and to the Collateral that is subject only to Permitted Liens which have first-priority by operation of applicable Law.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Personal Information means information identifiable to any person, including, but not limited to, information that relates to a person’s name, health, finances, education, business, use or receipt of governmental services or other activities, addresses, telephone numbers, Social Security Numbers, driver license numbers, other identifying numbers, and any financial identifiers.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Student Personal Information means information collected through a school service that personally identifies an individual student or other information collected and maintained about an individual student that is linked to information that identifies an individual student, as identified by Washington Compact Provision 28A.604.010. For purposes of this DPA, Student Personal Information is referred to as Student Data.

  • Breach of system security means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data. Good faith acquisition of sensitive personal information by an employee or agent of the person for the purposes of the person is not a breach of system security unless the person uses or discloses the sensitive personal information in an unauthorized manner. Business and Commerce Code 521.053(a)

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Obligor Intellectual Property means Intellectual Property owned by or licensed to any of the Obligors.

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Breach of the security of the system means unauthorized acquisition or acquisition without valid authorization of physical or computerized data which compromises the security, confidentiality, or integrity of personal information maintained by the district. Good faith acquisition of personal information by an officer or employee or agent of the district for the purposes of the district is not a breach of the security of the system, provided that the private information is not used or subject to unauthorized disclosure.

  • Baseline Personnel Security Standard means the pre-employment controls for all civil servants, members of the Armed Forces, temporary staff and government contractors generally.

  • Trade Secrets Collateral means all common law and statutory trade secrets and all other confidential or proprietary or useful information and all know-how obtained by or used in or contemplated at any time for use in the business of the Grantor (all of the foregoing being collectively called a "Trade Secret"), whether or not such Trade Secret has been reduced to a writing or other tangible form, including all documents and things embodying, incorporating or referring in any way to such Trade Secret, all Trade Secret licenses, including each Trade Secret license referred to in Schedule V attached hereto, and including the right to xxx for and to enjoin and to collect damages for the actual or threatened misappropriation of any Trade Secret and for the breach or enforcement of any such Trade Secret license.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • small and medium-sized enterprises or ‘SMEs’ means small and medium-sized enterprises as defined in Article 2 of the Annex to Commission Recommendation 2003/361/EC;

  • Contractor Intellectual Property means any intellectual property owned by Contractor and developed independently from the Services.

  • Transaction Personal Information has the meaning ascribed thereto in Section 9.1;

  • Special Personal Information means Personal Information as referred to in Section 26 of POPIA

  • Security Event means an immediately reportable subset of security incidents which incident would include: a. A suspected penetration of Contractor’s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed; b. Any indication, evidence, or other security documentation that the Contractor’s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication; c. A breach of the security of the Contractor’s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or, d. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor’s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.

  • Security Services means, a systemic approach to managing an organisation’s security needs as per specifications, terms and conditions stipulated under the contract, the organisation in this case refers to Medical Colleges/ Hospitals

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.