Falsification of Statement Sample Clauses

Falsification of Statement. Falsification of the reason in the request for personal leave is grounds for suspension or termination of employment.
Falsification of Statement. Falsification of a statement is grounds for suspension or termination of employment under Section 3319.16 of the Ohio Revised Code.

Related to Falsification of Statement

  • Confirmation of Status The parties confirm that the Asset Representations Reviewer is not responsible for (a) reviewing the Receivables for compliance with the representations and warranties under the Transaction Documents, except as described in this Agreement, or (b) determining whether noncompliance with the representations or warranties constitutes a breach of the Transaction Documents.

  • Confidentiality of State Information In performance of this Contract, and any exhibit or schedule hereunder, the Party acknowledges that certain State Data (as defined below), to which the Contractor may have access may contain individual federal tax information, personal protected health information and other individually identifiable information protected by State or federal law or otherwise exempt from disclosure under the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq (“State Data”). [In addition to the provisions of this Section, the Contractor shall comply with the requirements set forth in the State’s HIPAA Business Associate Agreement attached hereto as Attachment E]. Before receiving or controlling State Data, the Contractor will have an information security policy that protects its systems and processes and media that may contain State Data from internal and external security threats and State Data from unauthorized disclosure, and will have provided a copy of such policy to the State. State Data shall not be stored, accessed from, or transferred to any location outside the United States. The Contractor agrees that (a) it will use the State Data only as may be necessary in the course of performing duties or exercising rights under this Contract; (b) it will provide at a minimum the same care to avoid disclosure or unauthorized use of State Data as it provides to protect its own similar confidential and proprietary information; (c) it will not publish, reproduce, or otherwise divulge any State Data in whole or in part, in any manner or form orally or in writing to any third party unless it has received written approval from the State and that third party is subject to a written confidentiality agreement that contains restrictions and safeguards at least as restrictive as those contained in this Contract; (d) it will take all reasonable precautions to protect the State’s information; and (e) it will not otherwise appropriate such information to its own use or to the use of any other person or entity. Contractor will take reasonable measures as are necessary to restrict access to State Data in the Contractor’s possession to only those employees on its staff who must have the information on a “need to know” basis. The Contractor shall not retain any State Data except to the extent required to perform the services under this Contract. Contractor shall not access State user accounts or State Data, except in the course of data center operations, response to service or technical issues, as required by the express terms of this Contract, or at State’s written request. Contractor may not share State Data with its parent company or other affiliate without State’s express written consent. The Contractor shall promptly notify the State of any request or demand by any court, governmental agency or other person asserting a demand or request for State Data to which the Contractor or any third party hosting service of the Contractor may have access, so that the State may seek an appropriate protective order.

  • Conclusiveness of Statements; Survival of Provisions Determinations and statements of any Lender pursuant to Sections 8.1, 8.2, 8.3 or 8.4 shall be conclusive absent demonstrable error. Lenders may use reasonable averaging and attribution methods in determining compensation under Sections 8.1 and 8.4, and the provisions of such Sections shall survive repayment of the Obligations, cancellation of any Notes, expiration or termination of the Letters of Credit and termination of this Agreement.

  • Designation of Start-up Day The Closing Date is hereby designated as the "start-up day" of each of the Upper-Tier REMIC and Lower-Tier REMIC within the meaning of Section 860G(a)(9) of the Code.

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Waiver of Statutory Provisions The provisions of this Lease, including this Article 11, constitute an express agreement between Landlord and Tenant with respect to any and all damage to, or destruction of, all or any part of the Premises, the Building or the Project, and any statute or regulation of the State of California, including, without limitation, Sections 1932(2) and 1933(4) of the California Civil Code, with respect to any rights or obligations concerning damage or destruction in the absence of an express agreement between the parties, and any other statute or regulation, now or hereafter in effect, shall have no application to this Lease or any damage or destruction to all or any part of the Premises, the Building or the Project.

  • Accuracy of Statements Neither this Agreement nor any Schedule, Exhibit, statement, list, document, certificate or other information furnished by or on behalf of the Company to the Purchaser in connection with this Agreement or any of the transactions contemplated hereby contains any untrue statement of a material fact or omits to state a material fact necessary to make the statements contained herein or therein, in light of the circumstances in which they are made, not misleading.

  • Summary of State Ethics Laws Pursuant to the requirements of section 1-101qq of the Connecticut General Statutes, the summary of State ethics laws developed by the State Ethics Commission pursuant to section 1-81b of the Connecticut General Statutes is incorporated by reference into and made a part of the Contract as if the summary had been fully set forth in the Contract.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Notification of Breach / Compliance Reports The Adviser shall notify the Trust immediately upon detection of (i) any material failure to manage any Fund in accordance with its investment objectives and policies or any applicable law; or (ii) any material breach of any of the Funds’ or the Adviser’s policies, guidelines or procedures. In addition, the Adviser shall provide a quarterly report regarding each Fund’s compliance with its investment objectives and policies, applicable law, including, but not limited to the 1940 Act and Subchapter M of the Code, as applicable, and the Fund’s policies, guidelines or procedures as applicable to the Adviser’s obligations under this Agreement. The Adviser agrees to correct any such failure promptly and to take any action that the Board may reasonably request in connection with any such breach. Upon request, the Adviser shall also provide the officers of the Trust with supporting certifications in connection with such certifications of Fund financial statements and disclosure controls pursuant to the Xxxxxxxx-Xxxxx Act. The Adviser will promptly notify the Trust in the event (i) the Adviser is served or otherwise receives notice of any action, suit, proceeding, inquiry or investigation, at law or in equity, before or by any court, public board, or body, involving the affairs of the Trust (excluding class action suits in which a Fund is a member of the plaintiff class by reason of the Fund’s ownership of shares in the defendant) or the compliance by the Adviser with the federal or state securities laws or (ii) an actual change in control of the Adviser resulting in an “assignment” (as defined in the 0000 Xxx) has occurred or is otherwise proposed to occur.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!