JVCo Material Breach Sample Clauses

JVCo Material Breach. If there is a Material Breach of this Agreement by JVCo and that Material Breach is Not Resolved after following the Material Breach escalation process in Clause 29, ARM may elect to either: 28.2.1 suspend the license to JVCo of the ARM Licensed IP in accordance with Clause 30.1 (and may subsequently terminate this Agreement in accordance with Clause 30.1.5); or 28.2.2 subject to Clause 30.2, terminate this Agreement on no fewer than [***] Business Days’ written notice to JVCo.
AutoNDA by SimpleDocs

Related to JVCo Material Breach

  • Material Breach A material breach for purposes of this Agreement shall include, but not be limited to: (a) Failure to timely furnish the documents described in Section 6 or the information requested by GO-Biz or the FTB relating to Taxpayer’s compliance with this Agreement. (b) Material misstatements in any information provided to GO-Biz as part of the application process and/or after this Agreement is signed. (c) Failure to materially satisfy applicable Milestones as set forth in Exhibit A, materiality of which shall be determined by GO-Biz, by the end of the last taxable year identified in Exhibit A. (d) Failure to maintain one or more Milestones for a minimum of three (3) subsequent taxable years after achieving the Milestone(s).

  • Termination for Material Breach Either Party (the “Terminating Party”) may terminate this Agreement in its entirety, or on a country-by-country and Product-by-Product basis, in the event the other Party (the “Breaching Party”) has materially breached this Agreement, and such material breach has not been cured within sixty (60) days after receipt of written notice of such breach by the Breaching Party from the Terminating Party (the “Cure Period”). The written notice describing the alleged material breach shall provide sufficient detail to put the Breaching Party on notice of such material breach. Any termination of this Agreement pursuant to this Section 10.3 shall become effective at the end of the Cure Period, unless the Breaching Party has cured any such material breach prior to the expiration of such Cure Period; provided that in the event a claim of material breach is being contested diligently and in good faith by appropriate proceedings hereunder, any termination pursuant to this Section shall not become effective unless and until such material breach has been established in such proceedings and, in the event that, following such establishment, a cure may then be accomplished by the payment of money or the taking of certain actions, such payment or actions are not paid or taken within sixty (60) days of the conclusion of such proceedings. The right of either Party to terminate this Agreement as provided in this Section 10.3 shall not be affected in any way by such Party’s waiver of or failure to take action with respect to any previous breach under this Agreement.

  • Material Breach of Contract In the event Contractor fails to deliver the product and services as contracted for herein, to the satisfaction of the City of Sparks or otherwise fails to perform any provisions of this Contract, the City, after providing five (5) days written notice and Contractor’s failure to cure such breach within the time specified in the notice, may without waiving any other remedy, make good the deficiencies and deduct the actual cost of providing alternative products and/or services from payment due the Contractor. Non-performance after the first notice of non-performance shall be considered a material breach of contract.

  • Breach A breach of the contract clauses above may be grounds for termination of the contract, and for debarment as a contractor and subcontractor as provided in 29 C.F.R. § 5.12.

  • Independence from Material Breach Determination Except as set forth in Section X.D.1.c, these provisions for payment of Stipulated Penalties shall not affect or otherwise set a standard for OIG’s decision that Xxxxx has materially breached this IA, which decision shall be made at OIG’s discretion and shall be governed by the provisions in Section X.D, below.

  • Breach by Licensee a. The licensee shall have five (5) business days from its receipt of written notice by Producer and/or Producer’s authorized representative to cure any alleged breach of this Agreement by Licensee. Licensee’s failure to cure the alleged breach within five (5) business days shall result in Licensee’s default of its obligations, its breach of this Agreement, and at Producer's sole discretion, the termination of Licensee’s rights hereunder. b. If Licensee engages in the commercial exploitation and/or sale of the Beat or New Song outside of the manner and amount expressly provided for in this Agreement, Licensee shall be liable to Producer for monetary damages in an amount equal to any and all monies paid, collected by, or received by Licensee, or any third party on its behalf, in connection with such unauthorized commercial exploitation of the Beat and/or New Song. c. Licensee recognizes and agrees that a breach or threatened breach of this Agreement by Licensee give rise to irreparable injury to Producer, which may not be adequately compensated by damages. Accordingly, in the event of a breach or threatened breach by the Licensee of the provisions of this Agreement, Producer may seek and shall be entitled to a temporary restraining order and a preliminary injunction restraining the Licensee from violating the provisions of this Agreement. Nothing herein shall prohibit Producer from pursuing any other available legal or equitable remedy from such breach or threatened breach, including but not limited to the recovery of damages from the Licensee. The Licensee shall be responsible for all costs, expenses or damages that Producer incurs as a result of any violation by the Licensee of any provision of this Agreement. Licensee’ obligation shall include court costs, litigation expenses, and reasonable attorneys' fees.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • TERMINATION BY MPS - BREACH BY CONTRACTOR If Contractor fails to fulfill its obligations under this Contract in a timely or proper manner, or violates any of its provisions, MPS shall thereupon have the right to terminate it by giving five (5) days written notice before the effective date of termination of the Contract, specifying the alleged violations, and effective date of termination. The Contract shall not be terminated if, upon receipt of the notice, Contractor promptly cures the alleged violation with five (5) days. In the event of termination, MPS will only be liable for services rendered through the date of termination and not for the uncompleted portion, or for any materials or services purchased or paid for by Contractor for use in completing the Contract.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!