Security of Project Sample Clauses

Security of Project. Take such measures to prevent waste and protect the physical security of the Project as the Bank may reasonably deem advisable.
Security of Project. As set forth in Section 6.1, Landlord may provide, from time to time, employ one or more persons to provide security for the Project. Under no circumstances shall Landlord be liable to Tenant or to any other person by reason of any theft, burglary, robbery, assault, trespass, unauthorized entry, vandalism, or any other act of any third person occurring in or about the Premises except to the extent the same results from any gross negligence or willful misconduct on the part of Landlord, and Tenant shall indemnify Landlord and hold it harmless from and against any and all losses, liabilities, judgments, costs or expenses (including attorneys' fees and other costs of investigation or defense) which Landlord may suffer by reason of any claim asserted by Tenant's guests or invitees arising out of, or related to, any of the foregoing.

Related to Security of Project

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • DESCRIPTION OF PROJECT For the Company to be eligible to earn the Maximum Credit Amount, the Company will satisfy its obligations as reflected in the following representations, which the IEDC has relied upon: A. The Company will complete the Project at the Project Location. B. The Company represents that the number of permanent, Full-Time Employees (as defined in Indiana Code § 6–3.1–13–4) from whom Indiana state income tax withholdings are retained by the State of Indiana, employed as of the Commencement Date at the Project Location, is the Base Employment Number. C. The Project will result in the creation of New Employees (as defined in Indiana Code § 6- 3.1-13-6) at the Project Location of at least the Additional Jobs Commitment. D. The average of the hourly wages, before benefits, paid to New Employees at the Project Location, will at least equal the Average Wage Commitment. E. At the discretion of the IEDC, New Employees that are paid an average wage of less than the Minimum Wage Commitment may be excluded for the purpose of calculating the credit amount. F. The Project is anticipated to involve at least the Capital Investment Amount.

  • Priority of Provisions If there is a conflict or inconsistency between any term, statement, requirement, or provision of any exhibit attached hereto, any document or events referred to herein, or any document incorporated into this Agreement by reference and a term, statement, requirement, or provision of Articles 1 through 8 of this Agreement, the term, statement, requirement, or provision contained in Articles 1 through 8 shall prevail and be given effect.

  • Description of Property A narrative description of the Real Estate, the improvements thereon and the tenants and Leases relating to such Real Estate.