Misappropriation of Customer’s Payment Sample Clauses

Misappropriation of Customer’s Payment. Failure to pay in time or in full any repayment collected from customers, or collecting unreasonable interest or liquidated damages in the debt collection process.
AutoNDA by SimpleDocs

Related to Misappropriation of Customer’s Payment

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Infringement by Third Parties In the event that Novavax or the Company becomes aware of or has reasonable suspicions of third party activities in the Territory that could constitute infringement of the Novavax Patents or Patents that issue from Developed Know-How in the Territory, or with respect to ROW Patents anywhere in the world, or misappropriation of the Novavax Know-How or Developed Know-How in the Territory, or with respect to Developed Know-How any that is subject to the license granted to Novavax in Section 2.2 anywhere in the world (“ROW Know-How”), then such party shall promptly notify the other parties of such third party activities, including identification of the third party and delineation of the facts relating to such third party activities. The Company shall have the right (but shall not be obligated) to enforce the Novavax Patents, Novavax Know-How and Developed Know-How against any actual or alleged infringement or misappropriation thereof in the Territory by a third party (by bringing a suit, action or proceeding against such third party), at the Company’s sole expense. Novavax shall have the right (but shall not be obligated) to enforce the ROW Patents and ROW Know-How within the scope of the licenses granted to Novavax in Section 2.2 against any actual or alleged infringement or misappropriation thereof outside the Territory by a third party (by bringing a suit, action or proceeding against such third party), at Novavax’s sole expense. If the Company does not enforce the Novavax Patents or Know-How by (i) one hundred (100) days following the notice of alleged infringement or (ii) thirty (30) days before the time limit, if any, set forth in the appropriate laws and regulations for the filing of such an action, whichever comes first, then Novavax shall have the right (but not the obligation) to enforce the Novavax Patents and Novavax Know-How against any actual or alleged infringement or misappropriation thereof in the Territory by a third party (by bringing a suit, action or proceeding against such party), at Novavax’s sole expense. The non-prosecuting party shall reasonably cooperate with the prosecuting party in such enforcement activities, at the prosecuting party’s expense, including by agreeing to be named as a party to (or bringing in its own name) such suit, action or proceeding for the benefit of the non-prosecuting party if required for such enforcement action to proceed. The prosecuting party shall keep the non-prosecuting party reasonably informed regarding any such enforcement action and shall consider in good faith the reasonable comments and suggestions of the non-prosecuting party related to such suit, action or proceeding. All recoveries received by the prosecuting party from any such enforcement action shall be retained by the prosecuting party.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • PERSONAL AND ACADEMIC FREEDOM A. The personal life of a teacher shall be the concern of and warrant the review and appropriate action of the Board only: 1. As it may prevent the teacher from performing his/her assigned functions during school duty hours; 2. As it may be in violation of local, state, national, or common law. B. Each teacher will be entitled to full rights of citizenship, and no religious or political activities of any such teacher or the lack thereof will be grounds for any discipline or discrimination with respect to the professional employment of such person provided they do not affect his/her classroom performance. C. The Board and the Association agree that academic freedom is essential to the fulfillment of the purposes of the Xxxxxx County School System, and they acknowledge the fundamental need to protect teachers from any censorship or restraint which might interfere with their obligation to pursue the truth in the performance of their teaching functions. They agree that subject to curriculum guidelines and appropriate supervision by the teacher’s evaluator, the responsibility for teaching all appropriate material rests with the teacher. D. No student’s grade shall be changed without a conference between the student’s teacher and the administrator. After the conference, the teacher will be notified, in writing, of the administrator’s decision. In the event the student’s teacher is not available for a conference, the administrator will notify the teacher in writing of any changes in a grade.

  • Infringement of Third Party Rights Each Party shall promptly notify the other in writing of any allegation by a Third Party that the activity of either of the Parties hereunder infringes or may infringe the intellectual property rights of such Third Party. Genentech shall have the first right but not the obligation to control any defense of any such claim involving alleged infringement of Third Party rights by Genentech’s activities under this Agreement at its own expense and by counsel of its own choice, and Curis shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. If Genentech fails to proceed in a timely fashion with regard to such defense, Curis shall have the right but not the obligation to control any such defense of such claim at its own expense and by counsel of its own choice, and Genentech shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. Curis shall have the first right but not the obligation to control any defense of any such claim involving alleged infringement of Third Party rights by Curis’ activities under this Agreement at its own expense and by counsel of its own choice, and Genentech shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. If Curis fails to proceed in a timely fashion with regard to such defense, Genentech shall have the right but not the obligation to control any such defense of such claim at its own expense and by counsel of its own choice, and Curis shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. Neither Party shall have the right to settle any infringement action under this Section 10.5 in a manner that diminishes the rights or interests of the other Party hereunder without the consent of such Party.

  • Misuse The following are specific items that are considered misuse. They could result in immediate disconnection of your Internet connection without notice, and/or other sanctions as deemed appropriate by Residence Life staff. • Uploading, downloading or sharing of any copyrighted materials including, but not limited to, movies, music, games, and software. • Setting up of any server including, but not limited to, DHCP, SQL, FTP, WSeb, File and IIS. • Scanning the network for any reason. • Malicious hacking in any form. • Sharing of any material deemed inappropriate or offensive. • Tampering with or removing wireless access points in residence, or any other network hardware in residence. • Any activity that degrades the performance, or impacts the security, of the network. • Broadcasting a wireless network of any sort, including access point wireless printers. • Spoofing, or imitating, any official University of Waterloo networks such as eduroam or uw-wifi-setup-no-encryption. Problems arising from use for purposes other than those intended by the University of Waterloo will be seen as misuse. If you feel that ResNet does not meet your needs, you are welcome to arrange for an outside Internet Service Provider (ISP) at your own expense. Prior to arranging an alternative ISP, the Residence IT Service Desk should be consulted to ensure the required infrastructure exists. The University of Waterloo reserves the right to disconnect (without notice) any port if misuse is suspected. Misuse could ultimately result in disciplinary action up to and including eviction from residence and/or referral for academic disciplinary action. Commercial or criminal use of network resources is strictly prohibited, as is any use that may impact the performance of the network. Students are expected to comply fully with both the letter and the spirit of the law with respect to copyright and patents and thereby honour intellectual property rights.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!