Limitations and Exclusions The limitation and exclusion in this Section 8 shall not apply: (i) to the extent that liability cannot be limited or excluded according to the Applicable Law; (ii) in cases of our willful misconduct and gross negligence; (iii) in cases of bodily injuries or death caused by our negligence; and (iv) in cases of our fraud or fraudulent misrepresentation.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Although a brief overview is provided in this agreement, more detailed information is sent to the nominees in order for them to prepare their exchange.
Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.
Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).
Certain Limited Exclusions Notwithstanding anything herein or in any other Secured Debt Document to the contrary, in no event shall the Collateral include or the security interest granted under Section 2.1 hereof attach to (a) any lease, license, contract or agreement to which any Grantor is a party, and any of its rights or interest thereunder, if and to the extent that a security interest is prohibited by or in violation of (i) any law, rule or regulation applicable to such Grantor, or (ii) a term, provision or condition of any such lease, license, contract or agreement (unless such law, rule, regulation, term, provision or condition would be rendered ineffective with respect to the creation of the security interest hereunder pursuant to Sections 9-406, 9-407, 9-408 or 9-409 of the UCC (or any successor provision or provisions) of any relevant jurisdiction or any other applicable law (including the Bankruptcy Code) or principles of equity); provided, however, that the Collateral shall include (and such security interest shall attach) immediately at such time as the contractual or legal prohibition shall no longer be applicable and to the extent severable, shall attach immediately to any portion of such lease, license, contract or agreement not subject to the prohibitions specified in (i) or (ii) above; provided, further, that the exclusions referred to in clause (a) of this Section 2.2 shall not include any Proceeds of any such lease, license, contract or agreement; (b) in any of the outstanding voting Equity Interests of a Foreign Subsidiary or a Disregarded Domestic Subsidiary in excess of 65% of the voting power of all classes of Equity Interests of such Foreign Subsidiary or Disregarded Domestic Subsidiary entitled to vote; provided that immediately upon the amendment of the Internal Revenue Code to allow the pledge of a greater percentage of the voting power of Equity Interests in a Foreign Subsidiary or a Disregarded Domestic Subsidiary without adverse tax consequences, the Collateral shall include, and the security interest granted by each Grantor shall attach to, such greater percentage of Equity Interests of each Foreign Subsidiary or Disregarded Domestic Subsidiary, as applicable; (c) any “intent-to-use” application for registration of a Trademark filed pursuant to Section 1(b) of the Xxxxxx Act, 15 U.S.C. § 1051, prior to the filing of a “Statement of Use” pursuant to Section 1(d) of the Xxxxxx Act or an “Amendment to Allege Use” pursuant to Section 1(c) of the Xxxxxx Act with respect thereto, solely to the extent, if any, that, and solely during the period, if any, in which, the grant of a security interest therein would impair the validity or enforceability of any registration that issues from such intent-to-use application under applicable federal law; and (d) Equity Interests in any joint venture or any entity that is not a Subsidiary, other than proceeds thereof, but only to the extent that (x) the creation of a security interest in such Equity Interests is prohibited or restricted by the Organizational Documents of such entity or by any contractual restriction contained in any agreement with third party holders of the other Equity Interests in such entity which holders are not Affiliates of a Grantor (except to the extent any such prohibition or restriction is deemed ineffective under the UCC or other applicable law), in each case, in existence prior to the date hereof and (y) the Grantors used their commercially reasonable efforts, and did not succeed, to remove such prohibition or restriction. Notwithstanding anything set forth in this Agreement to the contrary, the Grantor shall not be required to register, or disclose any information which would result in a Regulatory Exception, provided that Grantor provide notice to Collateral Agent of any such determination along with such additional information as the Collateral Agent may reasonably request to verify to their satisfaction that such information is subject to a Regulatory Exception.
Limitations and exclusions of liability NONE OF THE TMLS AFFILIATES SHALL BE LIABLE TO SUBSCRIBER OR ANYONE ELSE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES THAT RESULT FROM THE USE OF, OR INABILITY TO USE, THE TMLS SERVICE, INCLUDING RELIANCE BY SUBSCRIBER ON ANY INFORMATION OBTAINED THROUGH USE OF THE TMLS SERVICE; MISTAKES, OMISSIONS, DELETIONS OR DELAYS IN TRANSMISSION OF SUCH INFORMATION; INTERRUPTIONS IN TELECOMMUNICATIONS CONNECTIONS TO THE TMLS SERVICE; AND VIRUSES OR FAILURES OF PERFORMANCE; WHETHER CAUSED IN WHOLE OR PART BY NEGLIGENCE, ACTS OF GOD, TELECOMMUNICATIONS FAILURE, OR THEFT OF, DESTRUCTION OF, OR UNAUTHORIZED ACCESS TO THE TMLS SERVICE AND RELATED INFORMATION, RECORDS AND PROGRAMS.
Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.
Requirements Pertaining Only to Federal Grants and Subrecipient Agreements If this Agreement is a grant that is funded in whole or in part by Federal funds:
Monopolies and Exclusive Service Suppliers 1. Each Party shall ensure that any monopoly supplier of a service in its territory does not, in the supply of the monopoly service in the relevant market, act in a manner inconsistent with that Party's Schedule of specific commitments. 2. Where a Party's monopoly supplier competes, either directly or through an affiliated company, in the supply of a service outside the scope of its monopoly rights and which is subject to that Party's Schedule of specific commitments, the Party shall ensure that such a supplier does not abuse its monopoly position to act in its territory in a manner inconsistent with such commitments. 3. If a Party has reason to believe that a monopoly supplier of a service of the other Party is acting in a manner inconsistent with paragraphs 1 or 2 above, it may request that Party establishing, maintaining or authorising such supplier to provide specific information concerning the relevant operations. 4. The provisions of this Article shall also apply to cases of exclusive service suppliers, where a Party, formally or in effect: (a) authorises or establishes a small number of service suppliers; and (b) substantially prevents competition among those suppliers in its territory.