Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.
Seller’s Breach Upon discovery by a Responsible Officer of the Master Servicer, the Securities Administrator or the Trustee or notice to the Master Servicer, the Securities Administrator or the Trustee of any defective or missing document (as described in the related Sale Agreement) in a Trustee Mortgage Loan File, or of any breach by any Seller of any representation, warranty or covenant under the related Sale Agreement, which defect or breach materially and adversely affects the value of any Mortgage Loan or the interest of the Trust therein (it being understood that any such defect or breach shall be deemed to have materially and adversely affected the value of the related Mortgage Loan or the interest of the Trust therein if the Trust incurs a loss as a result of such defect or breach),the parties discovering or receiving notice of such defect or breach shall notify the Securities Administrator. Upon discovering or receipt of notice of such breach, the Securities Administrator shall promptly request that such Seller cure such breach and, if such Seller does not cure such defect or breach in all material respects by the end of the cure period specified in such Sale Agreement and any extension of the cure period granted as permitted by such Sale Agreement, shall enforce such Seller’s obligation under such Sale Agreement to purchase such Mortgage Loan from the Trustee. In the event any Servicer has breached a representation or warranty under the related Servicing Agreement that is substantially identical to a representation or warranty breached by a Seller, the Securities Administrator shall first proceed against such Servicer. If such Servicer does not within 60 days (or such other period provided in the related Servicing Agreement) after notification of the breach, either take steps to cure such breach (which may be evidenced by a certificate asking for an extension of time in which to effectuate a cure) or complete the purchase of the Mortgage Loan, then (i) the Securities Administrator, shall enforce the obligations of the Seller under the related Sale Agreement to cure such breach or to purchase the Mortgage Loan from the Trust, and (ii) such Seller shall succeed to the rights of the Securities Administrator to enforce the obligations of the Servicer to cure such breach or repurchase such Mortgage Loan under the Servicing Agreement with respect to such Mortgage Loan. Notwithstanding the foregoing, however, if any breach of a representation or warranty by the Servicer or of a Seller is a Qualification Defect, a cure or purchase must take place within 75 days of the Defect Discovery Date.
No Conflict, Breach, Violation or Default The execution, delivery and performance of the Transaction Documents by the Company and the issuance and sale of the Securities will not conflict with or result in a breach or violation of any of the terms and provisions of, or constitute a default under (i) the Company’s Articles of Incorporation or the Company’s Bylaws, both as in effect on the date hereof (true and complete copies of which have been made available to the Investor through the XXXXX system), or (ii)(a) any statute, rule, regulation or order of any governmental agency or body or any court, domestic or foreign, having jurisdiction over the Company, any Subsidiary or any of their respective assets or properties, or (b) any agreement or instrument to which the Company or any Subsidiary is a party or by which the Company or a Subsidiary is bound or to which any of their respective assets or properties is subject.
Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.
Default; Breach A “Default” is defined as a failure by the Lessee to comply with or perform any of the terms, covenants, conditions or Rules and Regulations under this Lease. A “Breach” is defined as the occurrence of one or more of the following Defaults, and the failure of Lessee to cure such Default within any applicable grace period:
Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.
Our Liability for Failure to Complete Transactions If we do not properly complete a transaction from your Card on time or in the correct amount according to our Agreement with you, we will be liable for your losses or damages. However, there are some exceptions. We will not be liable, for instance:
Notification of Anticipatory Breach Vendor agrees that should it, for any reason, not be able to provide or maintain appropriate safeguards to fulfill its obligations under this Section, it will immediately inform Citizens in writing of such inability and such inability on Vendor’s part will serve as justification for Citizens’ termination of this Agreement, at Citizens’ sole election, at any time after the inability becomes known to Citizens.
Actions Upon Breach Should any Second Priority Representative or any Second Priority Debt Party, contrary to this Agreement, in any way take, attempt to take or threaten to take any action with respect to the Shared Collateral (including any attempt to realize upon or enforce any remedy with respect to this Agreement) or fail to take any action required by this Agreement, any Senior Representative or other Senior Secured Party (in its or their own name or in the name of the Borrower or any other Grantor) or the Borrower may obtain relief against such Second Priority Representative or such Second Priority Debt Party by injunction, specific performance or other appropriate equitable relief. Each Second Priority Representative, on behalf of itself and each Second Priority Debt Party under its Second Priority Facility, hereby (i) agrees that the Senior Secured Parties’ damages from the actions of the Second Priority Representatives or any Second Priority Debt Party may at that time be difficult to ascertain and may be irreparable and waives any defense that the Borrower, any other Grantor or the Senior Secured Parties cannot demonstrate damage or be made whole by the awarding of damages and (ii) irrevocably waives any defense based on the adequacy of a remedy at law and any other defense that might be asserted to bar the remedy of specific performance in any action that may be brought by any Senior Representative or any other Senior Secured Party.
Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article