Effect of Expiration/Termination of a Sales Order and/or SOW Sample Clauses

Effect of Expiration/Termination of a Sales Order and/or SOW. Upon the expiration or termination of a Sales Order and/or SOW for any reason (i) Comcast shall disconnect the applicable Service, (ii) Comcast may delete all applicable data, files, electronic messages, or other information stored on Comcast’s servers or systems and (iii) Comcast may assess and collect from Customer applicable Termination Charges. Termination by either Party of a Sales Order and/or SOW does not waive any other rights or remedies that it may have under this Agreement. The non-defaulting Party shall be entitled to all available legal and equitable remedies for such breach.
AutoNDA by SimpleDocs

Related to Effect of Expiration/Termination of a Sales Order and/or SOW

  • Effect of Expiration or Termination Upon any expiration or termination of this Agreement, except as expressly otherwise provided in this Agreement:

  • Effect of Termination of Agreement Upon the Termination Date or the Expiration Date, as applicable, any amounts then owing by a Party to the other Party shall become immediately due and payable and the then future obligations of Customer and Provider under this Agreement shall be terminated (other than the indemnity obligations set forth in Section 13). Such termination shall not relieve either Party from obligations accrued prior to the effective date of termination or expiration.

  • Termination of Use These terms and Your access to Our Website may be terminated by Us (at Our sole discretion) at any time without notice or any requirement to give You a reason why. In the event of termination under this clause We shall have no liability to You whatsoever (including for any consequential or direct loss You may suffer).

  • H4 Consequences of Expiry or Termination H4.1 Where the Authority terminates the Contract under clause F5.5 (Remedies in the Event of Inadequate Performance) or clause H2 (Termination on Default) and then makes other arrangements for the supply of Services, the Authority may recover from the Contractor the cost reasonably incurred of making those other arrangements and any additional expenditure incurred by the Authority throughout the remainder of the Contract Period. The Authority shall take all reasonable steps to mitigate such additional expenditure. Where the Contract is terminated under clause F5.5 or clause H2 (Termination on Default), no further payments shall be payable by the Authority to the Contractor until the Authority has established the final cost of making those other arrangements.

  • Termination of License 3.2.1 The Bank shall have, in the event of the Customer’s breach of or default under this Agreement and/ or the Bank being of the view that the Customer is not co-operating and/or complying with the terms and conditions of this Agreement, a right to terminate this Agreement and the license granted hereunder, after issuing to the Customer a prior written notice of not less than 3 (three) months by registered post or speed post (and also by (i) email where email id of the Customer is available; and (ii) SMS and/or WhatsApp where the mobile phone number of the Customer is available) (“Termination Notice”).

  • Expiration of Agreement Notwithstanding the expiration of this Agreement, any claim or grievance arising hereunder may be processed through the grievance procedure until resolution.

  • Effect of Agreement Termination or Expiration Termination or expiration of this Agreement in whole for any reason will immediately terminate Partner’s participation in any and all Programs. Upon such termination or expiration, Partner will immediately (i) cease referring to itself as a Red Hat Partner, or any other title associated with the Program, and using those titles in any communication or advertising; (ii) to the extent applicable, cease all promotion, demonstration, sale(s) and distribution of the Red Hat Products and/or Services; (iii) cease all use of the Red Hat Marks; (iv) return or destroy, at Red Hat’s option, all printed materials containing Red Hat Marks, including all documentation and Promotional Materials; and (v) remit all fees due to Red Hat within fifteen (15) days of such termination or expiration. If the termination is not the result of a Partner breach, the Partner will be entitled to sell, for a period of no longer than sixty (60) days after termination, any of its inventory of Red Hat Products (subject to this Agreement) for which Red Hat has been fully paid and that are required to fulfill any unperformed contracts of Partner outstanding at the date of termination or expiration. All rights and obligations of the Parties under this Agreement and all applicable Program Appendices will terminate immediately, except that obligations under Sections 6, 7, 8.2, 10, 11.2 – 11.5, 12, 13.3 - 13.4, 14.1 - 14.3, 14.6, 15, and 17 hereof, and any Partner payment obligations will survive such termination or expiration. Termination of this Agreement shall not affect any agreements between Red Hat and any End User.

  • Termination of Use or End of Season  At the conclusion of logging operations, ensure all conditions of these specifications have been met. Debris  Remove fallen timber, limbs, and stumps from the slopes, roadway, ditchlines, and culvert inlets. Do not undercut backslope No berms except as directed Keep clear of obstructions Add stable material or flume

  • Termination of Agreement If this Agreement is terminated by the Representatives in accordance with the provisions of Section 5 or Section 9(a)(i) hereof, the Company shall reimburse the Underwriters for all of their out-of-pocket expenses, including the reasonable fees and disbursements of counsel for the Underwriters.

  • Duration of Agreement and Protected Data Upon Termination or Expiration The Master Agreement commences on the date of signature. • Upon expiration of the Master Agreement without renewal, or upon termination of the Master Agreement prior to its expiration, Vendor will securely delete or otherwise destroy any and all Protected Data remaining in the possession of Vendor or any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data. If requested by the District, Vendor will assist the District in exporting all Protected Data previously received back to the District for its own use, prior to deletion, in such formats as may be requested by the District. • In the event the Master Agreement is assigned to a successor Vendor (to the extent authorized by the Master Agreement), the Vendor will cooperate with the District as necessary to transition Protected Data to the successor Vendor prior to deletion. • Neither Vendor nor any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data will retain any Protected Data, copies, summaries or extracts of the Protected Data, or any de-identified Protected Data, on any storage medium whatsoever. Upon request, Vendor and/or its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data, as applicable, will provide the District with a certification from an appropriate officer that these requirements have been satisfied in full. Challenging Accuracy of Protected Data: Parents or eligible students can challenge the accuracy of any Protected Data provided by the District to Vendor, by contacting the District regarding procedures for requesting amendment of education records under the Family Educational Rights and Privacy Act (FERPA). Teachers or principals may request to challenge the accuracy of APPR data provided to Vendor by following the appeal process in the District’s applicable APPR Plan. Data Storage and Security Protections: Any Protected Data that Vendor receives will be stored on systems maintained by Vendor, or by a subcontractor under the direct control of Vendor, in a secure data center facility located within the United States. The measures that Vendor (and, if applicable, its subcontractors) will take to protect Protected Data include adoption of technologies, safeguards and practices that align with the NIST Cybersecurity Framework, and safeguards associated with industry standards and best practices including, but not limited to, disk encryption, file encryption, firewalls, and password protection.

Time is Money Join Law Insider Premium to draft better contracts faster.