Continuity and Breach Sample Clauses

Continuity and Breach. The problem with this response to Xxxxxxxx’x argument is that it does not take into account that violating a duty does not tend to let one off the moral hook. On the contrary, the violation of a duty tends to create duties to undo or mitigate the violation. These remedial duties also tend to be more stringent than the original duties. To see this, consider the following case: Burning House: Xxxxxx’s house catches fire and is about to burn down, causing him to lose all his possessions. At time t1, Xxxxx can easily prevent this by turn- ing on his sprinklers. She refuses, and Xxxxxx’s house xxxxx down. Later, at t2, Xxxxx can help Xxxxxx offset the harm he suffered.20 Assuming that Xxxxx is required to help at t1, the fact that she chose not to seems very significant for what is required of her at t2. Intuitively, her reasons to help offset the harm differ from those that someone who happens to walk by has. For instance, if only one of them is needed to help offset the harm, Xxxxx should do it. Moreover, Xxxxx’s duty to help now seems more stringent than her initial duty to help and, likewise, more stringent than the duty that a stranger has to 20 Xxxxxx (2020b, p. 190) discusses a similar case. help now. That is, we can require more substantial sacrifices of her for the sake of Xxxxxx’s well-being now than we could have initially. What is sometimes called the Continuity Thesis helps account for some of this intuition. According to the thesis, the moral reasons which ground primary duties (say, to aid someone or not to harm them) do not simply vanish if we fail to comply with them. Instead, they – or at least very similar reasons – continue to exist post-violation and ground secondary, or “next- best”, duties to compensate or otherwise make up for the initial wrongdoing.21 This can help explain why Xxxxx’s duty to help offset the harm seems different from the duty to help which other strangers have. Her duty is remedial and the result of her violating a primary duty owed to Xxxxxx. That is why it is more appropriate that she rather than a stranger help him now. As Xxxxxx (2020b) explains, however, the Continuity Thesis as described cannot ex- plain the intuition that secondary duties are more stringent that primary ones. The thesis only holds that the same (or very similar) reasons that ground the primary duty continue to exist and ground a secondary duty post-breach. If those reasons initially only grounded a duty of a par- ticular stringency, how could the...
AutoNDA by SimpleDocs

Related to Continuity and Breach

  • Confidentiality and Safeguarding Information 1. Each Party may have access to confidential information made available by the other. The provisions of the Florida Public Records Act, Chapter 119, F.S., and other applicable state and federal laws will govern disclosure of any confidential information received by the State of Florida.

  • Confidentiality and Proprietary Information 6.1 For the purposes of this Agreement, "

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Confidentiality and Data Protection 12.1 Buyer undertakes that it shall not at any time disclose to any person any confidential information concerning (i) the business, affairs, customers, clients or suppliers of Seller or any of its affiliates and (ii) the operations, processes, product information, recipes and formulae, know-how, designs, trade secrets of Seller or any of its affiliates, except as permitted by Condition 12.2 (“Confidential Information”).

  • Data Breaches A. Upon the discovery by the Contractor of a confirmed breach of security that results in the unauthorized release, disclosure, or acquisition of student data, the Contractor shall provide initial notice to the Board as soon as reasonably possible, after such discovery (“Initial Notice”). The Initial Notice shall be delivered to the Board by electronic mail to Superintendent Xxxxxxx X. Xxxx, xxxxx@xxxxxxxxxxxx.xxx or to the contact currently on file and shall include the following information, to the extent known at the time of notification:

  • Termination and Breach 13.1 The termination of this Agreement or any part thereof however caused and the serving of notice to terminate shall be without prejudice to any obligations or rights of any of the parties which have accrued prior to such termination and shall not affect any provision of this Agreement which is expressly or by implication provided to come into effect on or to continue in effect after such termination

  • Confidentiality and Privacy The Training Provider must not, without the prior written approval of the Department, disclose (or permit the disclosure of) information regarding this VET Funding Contract (including details of the Funds being provided by the Department in respect of any individual) or any Confidential Information of the Department or the State, except: to the extent required under this VET Funding Contract; to the extent required by Law; to its solicitors, barristers and/or other professional advisors in order to obtain advice in relation to its rights under this VET Funding Contract, the Training Services or the Funds and provided such advisors are under a duty of confidentiality; to the extent necessary for the registration or recording of documents where required; and/or to the extent required in connection with legal proceedings, and then only to the extent strictly necessary for that purpose. The Training Provider acknowledges and agrees that: the Department may disclose or otherwise make available (whether to the public generally or to any particular person or group of persons) any and all information relating to the Training Provider and this VET Funding Contract (including Confidential Information of the Training Provider), including: course and qualification details; government subsidised fee information; details of the Funds paid; the contents of any surveys in which the Training Provider participates pursuant to Clause 4.5(j)(ii) or any employer surveys; any information that the Training Provider is required to publish on its website or otherwise make publicly available under this VET Funding Contract; details of any non-compliance by the Training Provider with this VET Funding Contract; any action taken by the Department under this VET Funding Contract; and findings and outcomes of any audits or reviews undertaken pursuant to this VET Funding Contract, as it considers reasonably appropriate to facilitate the proper operation of the Skills First Program, including as contemplated by Clause 12.3 of Schedule 1; the Department may disclose information referred to in paragraph (a), and any information regarding any suspected non-compliance by the Training Provider with this VET Funding Contract, for the purpose of satisfying its obligations under: the Freedom of Information Act 1982 (Vic); the Ombudsman Act 1973 (Vic); or the Audit Act 1994 (Vic); or the requirements of Parliamentary accountability or a Minister's obligations to fulfil their duties of office; and the Department may disclose information referred to in paragraph (a) or paragraph (b) to the counterparty to any Other VET Funding Arrangement, any regulator who has responsibility for issuing or monitoring compliance with the applicable registration referred to in Clause 4.1(a), or other government entity in any jurisdiction that has an interest in the regulation and funding of the VET sector. The Training Provider must take all steps and make all efforts to assist the Department in complying with any of the obligations referred to in Clause 13.2(b). The Training Provider acknowledges that it will be bound by the Information Privacy Principles and any applicable Code of Practice with respect to any act done or practice engaged in by the Training Provider under or in connection with this VET Funding Contract in the same way and to the same extent as the Department would have been bound had it been directly done or engaged in by the Department. The Training Provider must include a standard privacy notice in all enrolment forms, in accordance with the Victorian VET Student Statistical Collection Guidelines, which advises Eligible Individuals how their data may be supplied to and used by the Department and Commonwealth VET Student Loan agencies. The Training Provider must, in collecting any Personal Information for the purposes of this VET Funding Contract, ensure that it has obtained all necessary consents for: the Training Provider to collect, use, hold and disclose that Personal Information, including by disclosing it to the Department as contemplated by this VET Funding Contract (including by way of the submission of reports under Clause 12 of Schedule 1, for the purposes of complying with Record disclosure obligations under Clause 10 and in the course of any audit, review or investigation under Clause 11); and the Department to collect, use, hold and disclose that Personal Information for the purposes of this VET Funding Contract and its operation and management of the Skills First Program, in accordance with all applicable Laws, including the PDP Act, the Health Records Act and (if applicable to the Training Provider) the Privacy Act 1988 (Cth). The Training Provider must cooperate with, and provide any assistance requested by, the Department in relation to: resolving any complaint made to the Department alleging a breach of the PDP Act or the Health Records Act in relation to any Personal Information collected, used, held or disclosed by the Department that was provided to it by the Training Provider in connection with this VET Funding Contract; and providing access to or amendment of any record of Personal Information collected, used, held or disclosed in connection with this VET Funding Contract following a request from an individual made to the Department.

  • Confidentiality and Use In accordance with Article 3(7) of the IGA, all information exchanged pursuant to the IGA is subject to the confidentiality and other protections provided for in the Convention (hereinafter “Confidentiality Protections”), including the provisions limiting the use of the information exchanged. The Competent Authorities intend to maintain appropriate safeguards and infrastructure as described in Article 3(8) of the IGA (“Data Safeguards”).

  • Confidentiality and Non-Use The recipient of a disclosing Party’s Confidential Information shall maintain such Confidential Information in confidence, and shall disclose such Confidential Information only to its employees, agents, consultants, Affiliates, licensors, sublicensees, attorneys, accountants, investors, potential acquirors and advisors who have a reasonable need to know such Confidential Information and who are bound by obligations of confidentiality and non-use no less restrictive than those set forth herein and for whom each Party shall be responsible for any breach of this Section 6. The recipient of the disclosing Party’s Confidential Information shall use such Confidential Information solely to exercise its rights and perform its obligations under this Agreement (including, without limitation, the right to use and disclose such Confidential Information in regulatory applications and filings), unless otherwise mutually agreed in writing. The recipient of the other Party’s Confidential Information shall take the same degree of care that it uses to protect its own confidential and proprietary information of a similar nature and importance (but in any event no less than reasonable care).

  • CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!