Damages Security Storage Sample Clauses

Damages Security Storage 
AutoNDA by SimpleDocs

Related to Damages Security Storage

  • Indemnity Consequential Damages and Insurance 18.1 Indemnity 18.1.1 Indemnified Party 18.1.2 Indemnifying Party 18.1.3 Indemnity Procedures 18.2 Consequential Damages 18.3 Insurance 18.3.1 18.3.2 18.3.3 18.3.4 18.3.5 18.3.6 18.3.7 18.3.8 18.3.9 18.3.10 18.3.11

  • Violation; liability for unpaid wages; liquidated damages In the event of any violation of the clause set forth in paragraph (1.) of this section, the contractor and any subcontractor responsible therefor shall be liable for the unpaid wages. In addition, such contractor and subcontractor shall be liable to the United States (in the case of work done under contract for the District of Columbia or a territory, to such District or to such territory), for liquidated damages. Such liquidated damages shall be computed with respect to each individual laborer or mechanic, including watchmen and guards, employed in violation of the clause set forth in paragraph (1.) of this section, in the sum of $10 for each calendar day on which such individual was required or permitted to work in excess of the standard workweek of forty hours without payment of the overtime wages required by the clause set forth in paragraph (1.) of this section.

  • Damages; Relief Termination of this Agreement shall not preclude either Party from claiming any other damages, compensation or relief that it may be entitled to upon such termination.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Withholding for unpaid wages and liquidated damages The FHWA or the contacting agency shall upon its own action or upon written request of an authorized representative of the Department of Labor withhold or cause to be withheld, from any moneys payable on account of work performed by the contractor or subcontractor under any such contract or any other Federal contract with the same prime contractor, or any other federally-assisted contract subject to the Contract Work Hours and Safety Standards Act, which is held by the same prime contractor, such sums as may be determined to be necessary to satisfy any liabilities of such contractor or subcontractor for unpaid wages and liquidated damages as provided in the clause set forth in paragraph (2.) of this section.

  • Breach of Contract and Liquidated Damages A. Where OGS determines that the Contractor is not in compliance with the requirements of subsection 4.7 of this Contract, and the Contractor refuses to comply with such requirements, or if it is found to have willfully and intentionally failed to comply with the MWBE participation goals set forth in the Contract, the Contractor shall be obligated to pay liquidated damages to OGS. B. Such liquidated damages shall be calculated as an amount equaling the difference between: 1. All sums identified for payment to MWBEs had the Contractor achieved the contractual MWBE goals; and 2. All sums actually paid to MWBEs for work performed or materials supplied under the Contract. C. If OGS determines that Contractor is liable for liquidated damages and such identified sums have not been withheld by OGS, Contractor shall pay such liquidated damages to OGS within sixty (60) days after they are assessed. Provided, however, that if the Contractor has filed a complaint with the Director of the Division of Minority and Women’s Business Development pursuant to 5 NYCRR § 142.12, liquidated damages shall be payable only in the event of a determination adverse to the Contractor following the complaint process.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Relation to Other Security Documents The provisions of this Agreement shall be read and construed with the other Loan Documents referred to below in the manner so indicated.

  • Indirect Damages To the maximum extent permitted by Law, the Stripe Parties will not be liable to you or your Affiliates in relation to this Agreement or the Services during and after the Term (whether in contract, negligence, strict liability or tort, or on other legal or equitable grounds) for any lost profits, personal injury, property damage, loss of data, business interruption, indirect, incidental, consequential, exemplary, special, reliance, or punitive damages, even if these losses, damages, or costs are foreseeable, and whether or not you or the Stripe Parties have been advised of their possibility.

  • Treatment as a Security Agreement Pursuant to Section 1 hereof, the Seller has conveyed to the Purchaser all of its right, title and interest in and to the Mortgage Loans. The parties intend that such conveyance of the Seller’s right, title and interest in and to the Mortgage Loans pursuant to this Agreement shall constitute a purchase and sale and not a loan. If such conveyance is deemed to be a pledge and not a sale, then the parties also intend and agree that the Seller shall be deemed to have granted, and in such event does hereby grant, to the Purchaser, a first priority security interest in all of its right, title and interest in, to and under the Mortgage Loans, all payments of principal or interest on such Mortgage Loans due after the Cut-Off Date, all other payments made in respect of such Mortgage Loans after the Cut-Off Date (and, in any event, excluding scheduled payments of principal and interest due on or before the Cut-Off Date) and all proceeds thereof, and that this Agreement shall constitute a security agreement under applicable law. If such conveyance is deemed to be a pledge and not a sale, the Seller consents to the Purchaser hypothecating and transferring such security interest in favor of the Trustee and transferring the obligation secured thereby to the Trustee.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!