Inadequate Data Submissions Sample Clauses

Inadequate Data Submissions. If exposure data or other information required to be reported by the Company under the terms of this Contract is not received by the FHCF in the format specified by the FHCF or is inadequate to the extent that the FHCF requires resubmission of data, the Company will be required to pay the FHCF a resubmission fee of $1,000 for resubmissions that are not a result of an examination by the SBA. If a resubmission is necessary as a result of an examination report issued by the SBA, the first resubmission fee will be $2,000. If the Company’s examination-required resubmission is inadequate and the SBA requires an additional resubmission(s), the resubmission fee for each subsequent resubmission shall be $2,000. A resubmission of exposure data may delay the processing of the Company’s request for reimbursement or an advance.
AutoNDA by SimpleDocs
Inadequate Data Submissions. If exposure data or other information required to be reported by the Company under the terms of this Contract is not received by the FHCF in the format specified by the FHCF and is inadequate to the extent that the FHCF requires resubmission of data, the Company will be required to pay the FHCF a resubmission fee of $1,000. The $1,000 fee is also applicable to exposure resubmissions made as a result of examinations of the Company's exposure and claims data.

Related to Inadequate Data Submissions

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Regulatory Information (a) All the notaries at De Pinna LLP are regulated through the Faculty Office of the Archbishop of Canterbury. Its address is The Faculty Office, 0 Xxx Xxxxxxxxx, Xxxxxxxxxxx, Xxxxxx XX0X 0XX, its telephone: 000 0000 0000, and it can be reached by email at xxxxxxx.xxxxxx@0xxxxxxxxxxxx.xxx. It also has a website at xxx.xxxxxxxxxxxxx.xxx.xx. (b) We are required to comply with the rules of professional conduct and other regulatory arrangements of the Master of the Faculties, the sole regulator of notarial activities under the Legal Services Act 2007. Information about those rules and regulations may be found at xxxx://xxx.xxxxxxxxxxxxx.xxx.xx/notary/i-am-a-notary/notaries-rules-regulations/. (c) We comply with the Code of Practice published by the Master of the Faculties: xxxx://xxx.xxxxxxxxxxxxx.xxx.xx/notary/code-of-practice.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • COMMUNICATION AND SERVICE OF DOCUMENTS 14.1 Sending communication to you 14.2 When communication deemed to be received by you

  • Adequate Information Such Company Stockholder is a sophisticated stockholder and has adequate information concerning the business and financial condition of Acquiror and the Company to make an informed decision regarding this Agreement and the Transactions and has independently and without reliance upon Acquiror or the Company and based on such information as such Company Stockholder has deemed appropriate, made its own analysis and decision to enter into this Agreement. Such Company Stockholder acknowledges that Acquiror and the Company have not made and do not make any representation or warranty, whether express or implied, of any kind or character except as expressly set forth in this Agreement. Such Company Stockholder acknowledges that the agreements contained herein with respect to the Subject Shares held by such Company Stockholder are irrevocable.

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back-Up Policy available at XxxxxXXX.xxx or such other website address as may be notified to the Customer as such document may be amended by the Supplier in its sole discretion from time to time the current version of which is set out at Schedule 3 of this Agreement. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (b) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (c) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (d) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 5.5 The Supplier and the Customer shall comply with their respective obligations as set out in Schedule 4 of this Agreement

  • Maintenance of Confidential Information The Contractor acknowledges that in the course of its appointment hereunder the Contractor will, either directly or indirectly, have access to and be entrusted with information (whether oral, written or by inspection) relating to the Company or its respective affiliates, associates or customers (the “Confidential Information”). For the purposes of this Agreement, “Confidential Information” includes, without limitation, any and all Developments (as defined herein), trade secrets, inventions, innovations, techniques, processes, formulas, drawings, designs, products, systems, creations, improvements, documentation, data, specifications, technical reports, customer lists, supplier lists, distributor lists, distribution channels and methods, retailer lists, reseller lists, employee information, financial information, sales or marketing plans, competitive analysis reports and any other thing or information whatsoever, whether copyrightable or uncopyrightable or patentable or unpatentable. The Contractor acknowledges that the Confidential Information constitutes a proprietary right, which the Company is entitled to protect. Accordingly the Contractor covenants and agrees that during the Term and thereafter until such time as all the Confidential Information becomes publicly known and made generally available through no action or inaction of the Contractor, the Contractor will keep in strict confidence the Confidential Information and shall not, without prior written consent of the Company in each instance, disclose, use or otherwise disseminate the Confidential Information, directly or indirectly, to any third party.

  • Information and Services Required of the Owner The Owner shall provide information with reasonable promptness, regarding requirements for and limitations on the Project, including a written program which shall set forth the Owner’s objectives, constraints, and criteria, including schedule, space requirements and relationships, flexibility and expandability, special equipment, systems, sustainability and site requirements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!