Inclusions Confidential Information includes, without limitation, the following information (including without limitation, compilations or collections of information) relating or belonging to any Company Party (as well as their clients, customers and/or vendors) and created, prepared, accessed, used or reviewed by the Executive during or after the Employment Period: (1) product and manufacturing information, such as ingredients, combinations of ingredients and manufacturing processes; (2) scientific and technical information, such as research and development, tests and test results, formulae and formulations, studies and analysis; (3) financial and cost information, such as operating and production costs, costs of goods sold, costs of supplies and manufacturing materials, non-public financial statements and reports, profit and loss information, margin information and financial performance information; (4) customer related information, such as customer related contracts, engagement and scope of work letters, proposals and presentations, customer-related contacts, lists, identities and prospects, practices, plans, histories, requirements and needs, price information and formulae and information concerning client or customer products, services, businesses or equipment specifications; (5) vendor and supplier related information, such as the identities, practices, history or services of any vendors or suppliers and vendor or supplier contacts; (6) sales, marketing and price information, such as marketing and sales programs and related data, sales and marketing strategies and plans, sales and marketing procedures and processes, pricing methods, practices and techniques and pricing schedules and lists; (7) database, software and other computer related information, such as computer programs, data, compilations of information and records, software and computer files, presentation software and computer-stored or backed-up information including, but not limited to, e-mails, databases, word processed documents, spreadsheets, notes, schedules, task lists, images and video; (8) employee-related information, such as lists or directories identifying employees, representatives and contractors, and information regarding the competencies (knowledge, skill, experience), compensation and needs of employees, representatives and contractors and training methods; and (9) business- and operation-related information, such as operating methods, procedures, techniques, practices and processes, information about acquisitions, corporate or business opportunities, information about partners and potential investors, strategies, projections and related documents, contracts and licenses and business records, files, equipment, notebooks, documents, memoranda, reports, notes, sample books, correspondence, lists and other written and graphic business records.
Latent Defects Notwithstanding anything to the contrary set forth herein, no acceptance, or deemed acceptance, by City pursuant to this Section shall be applicable with respect to any Latent Defects. An acceptance, or deemed acceptance, by City pursuant to this Section shall not mean that City has accepted, or the other party has been relieved of, responsibility for: (i) compliance with the Laws; (ii) the proper application of construction means or methods; or (iii) correcting any portion of the Project if it later is determined that any portion of the Project is inconsistent with the Final Documents and Drawings.
Acts of Terrorism Exclusion With respect to each Mortgage Loan over $20 million, as of origination the related special-form all-risk insurance policy and business interruption policy (issued by an insurer meeting the Insurance Rating Requirements) do not specifically exclude Acts of Terrorism, as defined in the Terrorism Risk Insurance Act of 2002, as amended by the Terrorism Risk Insurance Program Reauthorization Act of 2007 and the Terrorism Risk Insurance Program Reauthorization Act of 2015 (collectively referred to as “TRIPRA”), from coverage, or if such coverage is excluded, it is covered by a separate terrorism insurance policy. With respect to each Mortgage Loan, the related Mortgage Loan documents do not expressly waive or prohibit the Mortgagee from requiring coverage for Acts of Terrorism, as defined in TRIPRA, or damages related thereto, except to the extent that any right to require such coverage may be limited by commercial availability on commercially reasonable terms, or as otherwise indicated on Schedule C; provided, that if TRIPRA or a similar or subsequent statute is not in effect, then, provided that terrorism insurance is commercially available, the Mortgagor under each Mortgage Loan is required to carry terrorism insurance, but in such event the Mortgagor shall not be required to spend on terrorism insurance coverage more than two times the amount of the insurance premium that is payable in respect of the property and business interruption/rental loss insurance required under the related Mortgage Loan documents (without giving effect to the cost of terrorism and earthquake components of such casualty and business interruption/rental loss insurance) at the time of the origination of the Mortgage Loan, and if the cost of terrorism insurance exceeds such amount, the Mortgagor is required to purchase the maximum amount of terrorism insurance available with funds equal to such amount.
Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Unauthorized Leave Leave other than that provided for in this section may be cause for disciplinary action.
SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.
Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Anti-Terrorism The Contractor agrees to undertake all reasonable efforts to ensure that none of the UNDP funds received under the Contract is used to provide support to individuals or entities associated with terrorism and that recipients of any amounts provided by UNDP hereunder do not appear on the list maintained by the Security Council Committee established pursuant to Resolution 1267 (1999). The list can be accessed via xxxxx://xxx.xx.xxx/sc/suborg/en/sanctions/1267/aq_sanctions_list. This provision must be included in all sub-contracts or sub-agreements entered into under the Contract.
BREACH SANCTIONS 22 Failure by CONTRACTOR to comply with any of the provisions, covenants, 23 or conditions of this Agreement shall be a material breach of this Agreement. 24 In such event, ADMINISTRATOR may, and in addition to immediate termination and 25 any other remedies available at law, in equity, or otherwise specified in this
Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.