Seller’s Breach Upon discovery by a Responsible Officer of the Master Servicer, the Securities Administrator or the Trustee or notice to the Master Servicer, the Securities Administrator or the Trustee of any defective or missing document (as described in the related Sale Agreement) in a Trustee Mortgage Loan File, or of any breach by any Seller of any representation, warranty or covenant under the related Sale Agreement, which defect or breach materially and adversely affects the value of any Mortgage Loan or the interest of the Trust therein (it being understood that any such defect or breach shall be deemed to have materially and adversely affected the value of the related Mortgage Loan or the interest of the Trust therein if the Trust incurs a loss as a result of such defect or breach),the parties discovering or receiving notice of such defect or breach shall notify the Securities Administrator. Upon discovering or receipt of notice of such breach, the Securities Administrator shall promptly request that such Seller cure such breach and, if such Seller does not cure such defect or breach in all material respects by the end of the cure period specified in such Sale Agreement and any extension of the cure period granted as permitted by such Sale Agreement, shall enforce such Seller’s obligation under such Sale Agreement to purchase such Mortgage Loan from the Trustee. In the event any Servicer has breached a representation or warranty under the related Servicing Agreement that is substantially identical to a representation or warranty breached by a Seller, the Securities Administrator shall first proceed against such Servicer. If such Servicer does not within 60 days (or such other period provided in the related Servicing Agreement) after notification of the breach, either take steps to cure such breach (which may be evidenced by a certificate asking for an extension of time in which to effectuate a cure) or complete the purchase of the Mortgage Loan, then (i) the Securities Administrator, shall enforce the obligations of the Seller under the related Sale Agreement to cure such breach or to purchase the Mortgage Loan from the Trust, and (ii) such Seller shall succeed to the rights of the Securities Administrator to enforce the obligations of the Servicer to cure such breach or repurchase such Mortgage Loan under the Servicing Agreement with respect to such Mortgage Loan. Notwithstanding the foregoing, however, if any breach of a representation or warranty by the Servicer or of a Seller is a Qualification Defect, a cure or purchase must take place within 75 days of the Defect Discovery Date.
Breach by Seller In the event Seller shall fail to fully and timely perform any of its obligations hereunder or shall fail to consummate the sale of the Property for any reason, except Purchaser’s default, Purchaser may: (1) enforce specific performance of this Contract; or (2) request that the Escrow Deposit, if any, shall be forthwith returned by the title company to Purchaser.
BREACH BY PURCHASER In the event Purchaser should fail to consummate the purchase of the Property, the conditions to Purchaser’s obligations set forth in Article III having been satisfied and Purchaser being in default and Seller not being in default hereunder, Seller shall have the right to receive the Escrow Deposit, if any, from the title company, the sum being agreed on as liquidated damages for the failure of Purchaser to perform the duties, liabilities, and obligations imposed upon it by the terms and provisions of this Contract, and Seller agrees to accept and take this cash payment as its total damages and relief and as Seller’s sole remedy hereunder in such event. If no Escrow Deposit has been made then Seller shall receive the amount of $500 as liquidated damages for any failure by Purchaser.
Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.
Seller Closing Deliverables Seller shall have delivered to Purchaser each of the certificates, instruments, agreements, documents and other items required to be delivered pursuant to Section 3.5 at or prior to the Closing Date.
Authority; No Breach By Agreement (a) NDC has the corporate power and authority necessary to execute, deliver and perform its obligations under this Agreement and to consummate the transactions contemplated hereby. The execution, delivery and performance of this Agreement and the consummation of the transactions contemplated herein, including the Merger, have been duly and validly authorized by all necessary corporate action in respect thereof on the part of NDC. This Agreement represents a legal, valid, and binding obligation of NDC, enforceable against NDC in accordance with its terms (except in all cases as such enforceability may be limited by applicable bankruptcy, insolvency, reorganization, receivership, conservatorship, moratorium, or similar Laws affecting the enforcement of creditors' rights generally and except that the availability of the equitable remedy of specific performance or injunctive relief is subject to the discretion of the court before which any proceeding may be brought). (b) Neither the execution and delivery of this Agreement by NDC, nor the consummation by NDC of the transactions contemplated hereby, nor compliance by NDC with any of the provisions hereof, will (i) conflict with or result in a breach of any provision of NDC's Certificate of Incorporation or Bylaws, or (ii) constitute or result in a Default under, or require any Consent pursuant to, or result in the creation of any Lien on any Asset of any NDC Entity under, any Contract or Permit of any NDC Entity, or, (iii) subject to receipt of the requisite Consents referred to in Section 9.1(b), constitute or result in a Default under, or require any Consent pursuant to, any Law or Order applicable to any NDC Entity or any of their respective material Assets. (c) Other than in connection or compliance with the provisions of the Securities Laws, applicable state corporate and securities Laws, and rules of the NYSE, and other than Consents required from Regulatory Authorities, and other than notices to or filings with the Internal Revenue Service or the Pension Benefit Guaranty Corporation with respect to any employee benefit plans, or under the HSR Act, no notice to, filing with, or Consent of, any public body or authority is necessary for the consummation by NDC of the Merger and the other transactions contemplated in this Agreement.
Documenting and Reporting Breaches 6.1 Business Associate shall report to Covered Entity any Breach of Unsecured PHI, including Breaches reported to it by a Subcontractor, as soon as it (or any of its employees or agents) becomes aware of any such Breach, and in no case later than two (2) business days after it (or any of its employees or agents) becomes aware of the Breach, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security. 6.2 Business Associate shall provide Covered Entity with the names of the individuals whose Unsecured PHI has been, or is reasonably believed to have been, the subject of the Breach and any other available information that is required to be given to the affected individuals, as set forth in 45 CFR § 164.404(c), and, if requested by Covered Entity, information necessary for Covered Entity to investigate the impermissible use or disclosure. Business Associate shall continue to provide to Covered Entity information concerning the Breach as it becomes available to it. Business Associate shall require its Subcontractor(s) to agree to these same terms and conditions. 6.3 When Business Associate determines that an impermissible acquisition, use or disclosure of PHI by a member of its workforce is not a Breach, as that term is defined in 45 CFR § 164.402, and therefore does not necessitate notice to the impacted individual(s), it shall document its assessment of risk, conducted as set forth in 45 CFR § 402(2). When requested by Covered Entity, Business Associate shall make its risk assessments available to Covered Entity. It shall also provide Covered Entity with 1) the name of the person(s) making the assessment, 2) a brief summary of the facts, and 3) a brief statement of the reasons supporting the determination of low probability that the PHI had been compromised. When a breach is the responsibility of a member of its Subcontractor’s workforce, Business Associate shall either 1) conduct its own risk assessment and draft a summary of the event and assessment or 2) require its Subcontractor to conduct the assessment and draft a summary of the event. In either case, Business Associate shall make these assessments and reports available to Covered Entity. 6.4 Business Associate shall require, by contract, a Subcontractor to report to Business Associate and Covered Entity any Breach of which the Subcontractor becomes aware, no later than two (2) business days after becomes aware of the Breach.
Condition to Closing Buyer acknowledges and agrees that the Closing is contingent upon the closing of the IPO, and that if, for whatever reason, the IPO is not completed, the Company shall not be obligated to issue and sell the Restricted Shares and Buyer shall not be required to purchase the Restricted Shares and this Agreement may be terminated in accordance with Section 5(k) below.
Seller Closing Deliveries Seller shall deliver the following documents to the Escrow Agent on or before the Closing Date: (a) With respect to the Asset: (i) the Deed duly executed by Seller; (ii) the Assignment of Leases duly executed by Seller; (iii) a xxxx of sale duly executed by Seller in substantially the form of Exhibit F attached hereto, relating to all fixtures, chattels, equipment and articles of Personal Property owned by Seller which are currently located upon or attached to the Property and used solely in connection with the operation of the Property (but not including items owned or leased by tenants, the Property Manager, or which are leased by Seller or any Excluded Assets); (iv) the Assignment of Contracts duly executed by Seller; (v) the Tenant Notices duly executed by Seller; (vi) notice letters to the vendors under the Assumed Contracts duly executed by Seller; (vii) an affidavit that Seller is not a “foreign person” within the meaning of the Foreign Investment in Real Property Tax Act of 1980, as amended, in substantially the form of Exhibit G attached hereto; (viii) the Assignment of Licenses, Permits, Warranties and General Intangibles duly executed by Seller; and (ix) to the extent in Seller’s possession, copies of the Space Leases which delivery may be satisfied by delivery of the on-site property management office at the Property. (b) With respect to the transactions contemplated hereunder: (i) all transfer tax returns to the extent required by law and the regulations issued pursuant thereto in connection with the payment of all state or local real property transfer taxes that are payable or arise as a result of the consummation of the transactions contemplated by this Agreement, in each case, as prepared by Seller and Buyer and duly executed by Seller; and (ii) a Closing Statement duly executed by Seller.
Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article