Continuity and Breach Sample Clauses

Continuity and Breach. The problem with this response to Xxxxxxxx’x argument is that it does not take into account that violating a duty does not tend to let one off the moral hook. On the contrary, the violation of a duty tends to create duties to undo or mitigate the violation. These remedial duties also tend to be more stringent than the original duties. To see this, consider the following case: Burning House: Xxxxxx’s house catches fire and is about to burn down, causing him to lose all his possessions. At time t1, Xxxxx can easily prevent this by turn- ing on his sprinklers. She refuses, and Xxxxxx’s house xxxxx down. Later, at t2, Xxxxx can help Xxxxxx offset the harm he suffered.20 Assuming that Xxxxx is required to help at t1, the fact that she chose not to seems very significant for what is required of her at t2. Intuitively, her reasons to help offset the harm differ from those that someone who happens to walk by has. For instance, if only one of them is needed to help offset the harm, Xxxxx should do it. Moreover, Xxxxx’s duty to help now seems more stringent than her initial duty to help and, likewise, more stringent than the duty that a stranger has to 20 Xxxxxx (2020b, p. 190) discusses a similar case. help now. That is, we can require more substantial sacrifices of her for the sake of Xxxxxx’s well-being now than we could have initially. What is sometimes called the Continuity Thesis helps account for some of this intuition. According to the thesis, the moral reasons which ground primary duties (say, to aid someone or not to harm them) do not simply vanish if we fail to comply with them. Instead, they – or at least very similar reasons – continue to exist post-violation and ground secondary, or “next- best”, duties to compensate or otherwise make up for the initial wrongdoing.21 This can help explain why Xxxxx’s duty to help offset the harm seems different from the duty to help which other strangers have. Her duty is remedial and the result of her violating a primary duty owed to Xxxxxx. That is why it is more appropriate that she rather than a stranger help him now. As Xxxxxx (2020b) explains, however, the Continuity Thesis as described cannot ex- plain the intuition that secondary duties are more stringent that primary ones. The thesis only holds that the same (or very similar) reasons that ground the primary duty continue to exist and ground a secondary duty post-breach. If those reasons initially only grounded a duty of a par- ticular stringency, how could the...
AutoNDA by SimpleDocs

Related to Continuity and Breach

  • Confidentiality and Ownership The Executive acknowledges and agrees that the Confidential Information (as defined in Paragraph 5(A) below) is the property of the Corporation, its subsidiaries and affiliates. Accordingly, the Executive agrees as follows:

  • Confidentiality and Proprietary Information 9.1 For the purposes of this Agreement, Confidential Information (“Confidential Information”) means confidential or proprietary technical or business information given by one Party (the “Discloser”) to the other (the “Recipient”). All information which is disclosed by one Party to the other in connection with this Agreement, during negotiations and the term of this Agreement will not be deemed Confidential Information to the Discloser and subject to this Section 9, unless the confidentiality of the information is confirmed in writing by the Discloser prior to disclosure. The Recipient agrees (i) to use Confidential Information only for the purpose of performing under this Agreement, (ii) to hold it in confidence and disclose it to no one other than its employees having a need to know for the purpose of performing under this Agreement, and (iii) to safeguard it from unauthorized use or disclosure using at least the same degree of care with which the Recipient safeguards its own Confidential Information. If the Recipient wishes to disclose the Discloser's Confidential Information to a third-party agent or consultant, such disclosure must be agreed to in writing by the Discloser, and the agent or consultant must have executed a written agreement of nondisclosures and nonuse comparable in scope to the terms of this section. 9.2 The Recipient may make copies of Confidential Information only as reasonably necessary to perform its obligations under this Agreement. All such copies will be subject to the same restrictions and protections as the original and will bear the same copyright and proprietary rights notices as are contained on the original. 9.3 The Recipient agrees to return all Confidential Information in tangible form received from the Discloser, including any copies made by the Recipient, within thirty (30) days after a written request is delivered to the Recipient, or to destroy all such Confidential Information if directed to do so by Discloser except for Confidential Information that the Recipient reasonably requires to perform its obligations under this Agreement; the Recipient shall certify destruction by written letter to the Discloser. If either Party loses or makes an unauthorized disclosure of the Party’s Confidential Information, it will notify such other Party immediately and use its best efforts to retrieve the lost or wrongfully disclosed information. 9.4 The Recipient shall have no obligation to safeguard Confidential Information: (i) which was in the possession of the Recipient free of restriction prior to its receipt from the Discloser; (ii) after it becomes publicly known or available through no breach of this Agreement by the Recipient; (iii) after it is rightfully acquired by the Recipient free of restrictions on its discloser; (iv) after it is independently developed by personnel of the Recipient to whom the Discloser's Confidential Information had not been previously disclosed. In addition, either Party will have the right to disclose Confidential Information to any mediator, arbitrator, state or federal regulatory body, or a court in the conduct of any mediation, arbitration or approval of this Agreement, as long as, in the absence of an applicable protective order, the Discloser has been previously notified by the Recipient in time sufficient for the Recipient to undertake all lawful measures to avoid disclosing such confidential information and for Discloser to have reasonable time to seek or negotiate a protective order before or with any applicable mediator, arbitrator, state or regulatory body or a court. 9.5 The Parties recognize that an individual End User may simultaneously seek to become or be a customer of both Parties. Nothing in this Agreement is intended to limit the ability of either Party to use customer specific information lawfully obtained from End Users or sources other than the Discloser. 9.6 Each Party’s obligations to safeguard Confidential Information disclosed prior to expiration or termination of this Agreement will survive such expiration or termination. 9.7 No license is hereby granted under any patent, trademark, or copyright, nor is any such license implied solely by virtue or the disclosure of any Confidential Information. 9.8 Each Party agrees that the Discloser may be irreparably injured by a disclosure in breach of this Agreement by the Recipient or its representatives and the Discloser will be entitled to seek equitable relief, including injunctive relief and specific performance, in the event of any breach or threatened breach of the confidentiality provisions of this Agreement. Such remedies will not be deemed to be the exclusive remedies for a breach of this Agreement, but will be in addition to all other remedies available at law or in equity.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • Confidentiality and Data Protection We are a data controller for the information you provide to us including individual, identification and financial details, policy history and special category data (such as medical or criminal history). Details of our legal basis for processing your information, along with details of any third party recipient whom it may be necessary to share your personal data with in order to fulfil the contract, retention period for data held, security of your data, your rights under the UK General Data Protection Regulations (UK GDPR) including the right to complain can be found in our full ‘Privacy Notice’ attached to these terms of business and/or on our website at xxx.xxxxxxxxxxxxxxxx.xx.xx.

  • Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article

  • TERMINATION AND BREACH This License Agreement shall be terminated: a) in the event of any affirmative act of insolvency by MARKETING; or b) upon the appointment of any receiver or trustee to take possession of the properties of MARKETING. REALTY shall have the right to terminate this License Agreement either a) upon a material default by MARKETING under the Master Lease which is not cured within the cure periods specified therein; or b) upon a material default by MARKETING with respect to its obligations under the Reorganization and Distribution Agreement between the parties of even date which is not Rcured within the cure periods specified therein. In the event of any other breach or threatened breach of this License Agreement, notice shall be given and the parties shall promptly consult in good faith to cure such breach, with the party at fault being given an adequate period of time to remedy the matter. If such breach is not cured within sixty (60) days of the notice, the matter may be submitted to arbitration in accordance with paragraph 16 below, which may include a determination whether a material breach has occurred and/or been cured. In the event the arbitrator determines that a material breach has occurred, the arbitrator shall not be authorized to terminate this License Agreement (except in the case of a material breach by MARKETING which creates a substantial likelihood of loss of rights in the Licensed Marks) but shall be authorized to issue any other order or award any other relief deemed appropriate, including, without limitation, injunctive relief. In the event of a material breach by MARKETING which creates a substantial likelihood of loss of rights in the Licensed Marks, the arbitrator shall be authorized to issue any order awarding any relief deemed appropriate, including, without limitation, injunctive relief, and further providing that in the event MARKETING fails to comply with the relief ordered within a specified period of time, the license shall be terminated.

  • Confidentiality and Trade Secrets (a) The Executive acknowledges and agrees that his position as an employee of the Company will afford him a unique opportunity to acquire confidential information concerning the Company and that the misappropriation or disclosure of such confidential information would cause irreparable harm to the Company. The Executive recognizes and agrees that he will have access to certain confidential information of the Company that is not generally available to the public and that such information constitutes valuable, special and unique property of the Company. The Executive acknowledges that such confidential information includes information concerning the Business and the Company including, without limitation, financial information concerning the Business or the Company, the names and addresses of actual and potential customers or acquisition or investment targets of the Business or the Company, studies of prospective market areas for the Business, supply sources, products, technical data, notes, diagrams, drawings, flow charts, ideas, techniques, specifications, procedures, processes, research, development, and trade secrets of the Business and the Company (such information whether related to the Business or the Company being referred to collectively as the “Confidential Information”). Confidential Information shall not include any information or documents (i) that are or become publicly available or otherwise known in the industry without breach of this Section 4.02; or (ii) that the Executive rightfully receives from any third party which is not breaching an obligation of confidence with the Company or without an accompanying obligation of confidence; or (iii) that were known to or by the Executive prior to his appointment with the Company without breach of this Section 4.02. In the event that the Executive is requested in any court or governmental proceeding to disclose any Confidential Information, the Executive shall give the Company prompt notice of such request such that the Company may seek a protective order or other appropriate relief and shall cooperate in all respects with the Company in its efforts in connection therewith. (b) The Executive will keep confidential and will not, during his employment and for a period of five (5) years after any termination under this Agreement (whether by expiration or pursuant to Section 5.01 or otherwise), directly or indirectly, divulge to anyone, use or otherwise appropriate any of the Confidential Information for any reason or purpose whatsoever except to authorize representatives of the Company or when, in the good faith belief of the Executive, such disclosure is necessary or desirable in the normal course of the Business in order for the Executive to fulfill his duties and responsibilities to the Company as set out in Section 2.02. (c) The Executive acknowledges and agrees that these prohibitions against disclosure of Confidential Information are in addition to, and not in lieu of, any rights or remedies which the Company may have available pursuant to the laws of any jurisdiction or at common law to prevent the disclosure of trade secrets or proprietary information, and the enforcement by the Company of any of their rights and remedies pursuant to this Agreement shall not be construed as a waiver of any other rights or available remedies which they may possess in law or equity absent this Agreement. (d) Upon any termination of his employment under this Agreement, the Executive shall surrender to the Company all documents and materials in his possession, custody or control embodying the Confidential Information or any part thereof.

  • Confidentiality and Privacy The Training Provider must not, without the prior written approval of the Department, disclose (or permit the disclosure of) information regarding this VET Funding Contract (including details of the Funds being provided by the Department in respect of any individual) or any Confidential Information of the Department or the State, except: to the extent required under this VET Funding Contract; to the extent required by Law; to its solicitors, barristers and/or other professional advisors in order to obtain advice in relation to its rights under this VET Funding Contract, the Training Services or the Funds and provided such advisors are under a duty of confidentiality; to the extent necessary for the registration or recording of documents where required; and/or to the extent required in connection with legal proceedings, and then only to the extent strictly necessary for that purpose. The Training Provider acknowledges and agrees that: the Department may disclose or otherwise make available (whether to the public generally or to any particular person or group of persons) any and all information relating to the Training Provider and this VET Funding Contract (including Confidential Information of the Training Provider), including: course and qualification details; government subsidised fee information; details of the Funds paid; the contents of any surveys in which the Training Provider participates pursuant to Clause 4.5(j)(ii) or any employer surveys; any information that the Training Provider is required to publish on its website or otherwise make publicly available under this VET Funding Contract; details of any non-compliance by the Training Provider with this VET Funding Contract; any action taken by the Department under this VET Funding Contract; and findings and outcomes of any audits or reviews undertaken pursuant to this VET Funding Contract, as it considers reasonably appropriate to facilitate the proper operation of the Skills First Program, including as contemplated by Clause 12.3 of Schedule 1; the Department may disclose information referred to in paragraph (a), and any information regarding any suspected non-compliance by the Training Provider with this VET Funding Contract, for the purpose of satisfying its obligations under: the Freedom of Information Act 1982 (Vic); the Ombudsman Act 1973 (Vic); or the Audit Act 1994 (Vic); or the requirements of Parliamentary accountability or a Minister's obligations to fulfil their duties of office; and the Department may disclose information referred to in paragraph (a) or paragraph (b) to the counterparty to any Other VET Funding Arrangement, any regulator who has responsibility for issuing or monitoring compliance with the applicable registration referred to in Clause 4.1(a), or other government entity in any jurisdiction that has an interest in the regulation and funding of the VET sector. The Training Provider must take all steps and make all efforts to assist the Department in complying with any of the obligations referred to in Clause 13.2(b). The Training Provider acknowledges that it will be bound by the Information Privacy Principles and any applicable Code of Practice with respect to any act done or practice engaged in by the Training Provider under or in connection with this VET Funding Contract in the same way and to the same extent as the Department would have been bound had it been directly done or engaged in by the Department. The Training Provider must include a standard privacy notice in all enrolment forms, in accordance with the Victorian VET Student Statistical Collection Guidelines, which advises Eligible Individuals how their data may be supplied to and used by the Department and Commonwealth VET Student Loan agencies. The Training Provider must, in collecting any Personal Information for the purposes of this VET Funding Contract, ensure that it has obtained all necessary consents for: the Training Provider to collect, use, hold and disclose that Personal Information, including by disclosing it to the Department as contemplated by this VET Funding Contract (including by way of the submission of reports under Clause 12 of Schedule 1, for the purposes of complying with Record disclosure obligations under Clause 10 and in the course of any audit, review or investigation under Clause 11); and the Department to collect, use, hold and disclose that Personal Information for the purposes of this VET Funding Contract and its operation and management of the Skills First Program, in accordance with all applicable Laws, including the PDP Act, the Health Records Act and (if applicable to the Training Provider) the Privacy Act 1988 (Cth). The Training Provider must cooperate with, and provide any assistance requested by, the Department in relation to: resolving any complaint made to the Department alleging a breach of the PDP Act or the Health Records Act in relation to any Personal Information collected, used, held or disclosed by the Department that was provided to it by the Training Provider in connection with this VET Funding Contract; and providing access to or amendment of any record of Personal Information collected, used, held or disclosed in connection with this VET Funding Contract following a request from an individual made to the Department.

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

  • CONFIDENTIALITY AND LOYALTY The Executive acknowledges that heretofore or hereafter during the course of his employment he has produced and received, and may hereafter produce, receive and otherwise have access to various materials, records, data, trade secrets and information not generally available to the public (collectively, "Confidential Information") regarding the Employer and its subsidiaries and affiliates. Accordingly, during and subsequent to termination of this Agreement, the Executive shall hold in confidence and not directly or indirectly disclose, use, copy or make lists of any such Confidential Information, except to the extent that such information is or thereafter becomes lawfully available from public sources, or such disclosure is authorized in writing by the Employer, required by law or by any competent administrative agency or judicial authority, or otherwise as reasonably necessary or appropriate in connection with the performance by the Executive of his duties hereunder. All records, files, documents, computer diskettes, computer programs and other computer-generated material, as well as all other materials or copies thereof relating to the Employer's business, which the Executive shall prepare or use, shall be and remain the sole property of the Employer, shall not be removed from the Employer's premises without its written consent, and shall be promptly returned to the Employer upon termination of the Executive's employment hereunder. The Executive agrees to abide by the Employer's reasonable policies, as in effect from time to time, respecting confidentiality and the avoidance of interests conflicting with those of the Employer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!