Security Continued Clause Samples

Security Continued. Individually identifiable information from the records will be maintained on a computer system to which users, other than those listed in Clause 2, have access. Yes No If yes, access to the information will be restricted through the use of passwords and by other computer security measures that prevent unauthorized access, and can trace such unauthorized access, including the following methods:
Security Continued. The Company’s and the Envision Entities’ obligations under all the Transaction Documents, including without limitation this Note, shall be secured by all the assets of the Envision Entities pursuant to the Security Agreements as if this Note were in effect at the time of execution of such Security Agreements and referenced therein. The Company shall execute such other agreements, documents and financing statements reasonably requested by the Holder, which will be filed at the Company’s expense with the applicable jurisdictions and authorities.
Security Continued. The Axis Entities’ obligations under all the Transaction Documents, including without limitation this Agreement, the Amended and Restated Note and the Warrant, shall be secured by all the assets of the Axis Entities pursuant to the Security Agreements (and guaranteed by the Guarantor under the Guarantee) as if this Agreement and the Amended and Restated Note were each in effect at the time of execution of such Security Agreements and referenced therein. The Company shall execute such other agreements, documents and financing statements reasonably requested by Investor, which will be filed at the Company’s expense with the applicable jurisdictions and authorities.
Security Continued. The Envision Entities’ obligations under all the Transaction Documents, including without limitation this Agreement, the A&R Note and the Warrants, shall be secured by all the assets of the Envision Entities pursuant to the Security Agreements as if this Agreement and the A&R were in effect at the time of execution of such Security Agreements and referenced therein. The Envision Entities’ shall execute such other agreements, documents and financing statements reasonably requested by the Investor, which will be filed at the Company’s expense with the applicable jurisdictions and authorities.
Security Continued. The Blue Entities’ obligations under all the Transaction Documents, including without limitation this Agreement, the Amended and Restated Note and the Amended and Restated Warrant, shall be secured by all the assets of the Blue Entities pursuant to the Security Agreements as if this Agreement, the Amended and Restated Note and the Amended and Restated Warrant were each in effect at the time of execution of such Security Agreements and referenced therein. The Company shall execute such other agreements, documents and financing statements reasonably requested by Investor, which will be filed at the Company’s expense with the applicable jurisdictions and authorities.
Security Continued. Comply with Schools Security Policy and cooperate with the Authority Officer and Establishment Head and comply with all reasonable instructions on security 13 Kitchen EquipmentDetails of maintenance responsibilities are available in Appendix D 13.1 Mandatory Testing Responsible for all ▇▇▇ equipment, gas checks and air intakes etc. . Mandatory KPI 13.2 Assets All kitchen equipment (e.g. utensils, white goods etc) belongs to the school and should appear in their school asset register Kitchen equipment to be made available to the Agents between the hours of 0730-1430hours or as required. Where possible, agree in advance with kitchen staff when School will be using kitchen equipment outside of core hours – mandatory cleaning of all equipment must be carried out as per the kitchen cleaning guidance Provide a full inventory of equipment both heavy and light and agree with the contents with the Establishment Head or School Representative. All kitchen assets to be available for the school to use outside of the lunch time catering requirements. Equipment Management The Council will be sole judge as to the sufficiency of equipment provided. Deduct any costs resulting from the Agents staff damaging or misusing the Council’s buildings and equipment from the Agents invoices Flexibility of hours to be agreed locally. 13.3 Personal Property Agent liable for loss of, or damage to, the personal property of Agents staff however caused. 13.4 Equipment Permitted to use own equipment provided that the quality of the service is not affected and the approval obtained from the Authorised Officer and Establishment Head.
Security Continued. The Company’s obligations under the Debenture and Warrants, including without limitation this Amendment, the Debenture as amended, the Warrant as amended and the Additional Warrant, shall be secured by all the assets of the Company pursuant to the security agreement entered into by the Company in favor of the Holder, among others, in connection with the Purchase Agreement as if this Amendment, the Debenture as amended, the Warrant as amended and the Additional Warrant were each in effect at the time of execution of such security agreement and referenced therein. The Company shall execute such other agreements, documents and financing statements reasonably requested by the Holder, which will be filed at the Company’s expense with the applicable jurisdictions and authorities.
Security Continued. The Axis Entities’ obligations under all the Transaction Documents shall be secured by all the assets of the Axis Entities pursuant to the Security Documents (and guaranteed by the Guarantor under the Guarantee) as if this Agreement and the Note as amended hereby were each in effect at the time of execution of such Security Documents and referenced therein. The Company shall execute such other agreements, documents and financing statements reasonably requested by Investor, which will be filed at the Company’s expense with the applicable jurisdictions and authorities.

Related to Security Continued

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Availability Control Personal Data will be protected against accidental or unauthorized destruction or loss.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Operator’s Security Contact Information ▇▇▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇ Named Security Contact ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇▇ Email of Security Contact (▇▇▇) ▇▇▇-▇▇▇▇ Phone Number of Security Contact

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.