Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.
Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.
Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.
Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.
Unauthorised disclosure For the avoidance of doubt, a party will be responsible for any unauthorised disclosure of Confidential Information made by that party’s employees, directors, agents or advisors and by a bona fide potential purchaser to whom Confidential Information has been disclosed by that party under clause 22.2(f).
Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period.
Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.
LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION You agree to notify Credit Union immediately, orally or in writing at Florida Credit Union, X.X. Xxx 0000, Xxxxxxxxxxx, XX 00000 or telephone (000) 000-0000 twenty four
Loss, Theft, Destruction or Mutilation of Warrant The Company covenants that upon receipt by the Company of evidence reasonably satisfactory to it of the loss, theft, destruction or mutilation of this Warrant or any stock certificate relating to the Warrant Shares, and in case of loss, theft or destruction, of indemnity or security reasonably satisfactory to it (which, in the case of the Warrant, shall not include the posting of any bond), and upon surrender and cancellation of such Warrant or stock certificate, if mutilated, the Company will make and deliver a new Warrant or stock certificate of like tenor and dated as of such cancellation, in lieu of such Warrant or stock certificate.
Return or Destruction of PHI At termination of this Agreement, Business Associate hereby agrees to return or destroy all PHI provided by or obtained on behalf of Covered Entity. Business Associate agrees not to retain any copies of the PHI after termination of this Agreement. If return or destruction of the PHI is not feasible, Business Associate agrees to extend the protections of this Agreement to limit any further use or disclosure until such time as the PHI may be returned or destroyed. If Business Associate elects to destroy the PHI, it shall certify to Covered Entity that the PHI has been destroyed.