We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Notice of Unauthorized Acts Sample Clauses

Notice of Unauthorized ActsThe Receiving Party will: (i) notify the Furnishing Party promptly upon its becoming aware of any unauthorized possession, use, or knowledge of the Furnishing Party’s Confidential Information by any person; (ii) promptly furnish to the Furnishing Party full details that the Receiving Party has or may obtain regarding such unauthorized access and use reasonable efforts to assist the Furnishing Party in investigating or preventing the reoccurrence of any such access; (iii) cooperate with the Furnishing Party in any litigation and investigation against third parties deemed reasonably necessary by such Party to protect its proprietary rights; and (iv) promptly take all reasonable actions necessary to prevent a reoccurrence of any such authorized access.
Notice of Unauthorized ActsThe Receiving Party will: (i) notify the Furnishing Party promptly upon its becoming aware of any unauthorized possession, use, or knowledge of the Furnishing Party’s Confidential Information by any person; (ii) promptly furnish to the Furnishing Party full details that the Receiving Party has or may obtain regarding such unauthorized access and use reasonable efforts to assist the Furnishing Party in investigating or preventing the reoccurrence of any such access; (iii) cooperate with the Furnishing Party in any litigation and investigation against third parties deemed reasonably necessary by such party to protect its proprietary rights; (iv) promptly take all reasonable actions necessary to prevent a reoccurrence of any such authorized access; and (v) take all reasonable measures to ensure that the Furnishing Party’s Confidential Information is not disclosed or duplicated in contravention of the provisions of this Agreement by such officers, directors, agents, professional advisors, subcontractors and employees.
Notice of Unauthorized ActsThe Receiving Party shall: (A) notify the Furnishing Party promptly upon its becoming aware of: (i) any unauthorized disclosure of the Furnishing Party's Confidential Information by either the Receiving Party or any person or entity to which the Receiving Party provides the Furnishing Party's Confidential Information; (ii) any successful attempt by any person to gain possession of the Furnishing Party's Confidential Information without authorization; or (iii) any use of any of the Furnishing Party's Confidential Information without authorization; (B) promptly furnish to the Furnishing Party full details that the Receiving Party has or may obtain regarding such unauthorized disclosure and use reasonable efforts to assist the Furnishing Party in investigating or preventing the reoccurrence of any such disclosure; (C) reasonably cooperate with the Furnishing Party in any litigation and investigation against third parties deemed reasonably necessary by the Furnishing Party to protect its proprietary rights, which cooperation shall be at the expense of the Furnishing Party except to the extent that any such litigation or investigation relates to a violation by either (x) the Receiving Party of its confidentiality obligations hereunder or (y) any person or entity to which the Receiving Party provides the Furnishing Party's Confidential Information of its confidential terms substantially similar to those set forth herein; and (D) promptly take all reasonable actions necessary to prevent a reoccurrence of any such unauthorized disclosure.
Notice of Unauthorized ActsEach party shall (a) promptly notify the other party of any material unauthorized possession, use, or knowledge, or attempt thereof, of the other party’s systems or data by any person or entity that may become known to such party; (b) assist the other party in investigating such unauthorized acts and taking action to prevent the continuation or recurrence thereof; and (c) provide reasonable cooperation with respect to any litigation or other action deemed necessary by the other party to protect its proprietary rights.

Related to Notice of Unauthorized Acts

  • Unauthorized Acts Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. § 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • Authorized Activities In carrying out the purposes of the Partnership, but subject to all other provisions of this Agreement, the Partnership is authorized to engage in any kind of lawful activity, and perform and carry out contracts of any kind, necessary or advisable in connection with the accomplishment of the purposes and business of the Partnership described herein and for the protection and benefit of the Partnership; provided that the General Partner shall not be obligated to cause the Partnership to take, or refraining from taking, any action which, in the judgment of the General Partner, (i) could adversely affect the ability of the General Partner to qualify and continue to qualify as a REIT, (ii) could subject the General Partner to additional taxes under Code Section 857 or 4981 or (iii) could violate any law or regulation of any governmental body or agency having jurisdiction over the General Partner or its securities.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release. (b) Vendor will provide such notification to the District by contacting Xxxxxx Xxx, Data Protection Officer, directly by email at xxxxxx.xxx@xxxxx.xxx or by calling 000-000-0000. (c) Vendor will cooperate with the District and provide as much information as possible directly to Xxxxxx Xxx, Data Protection Officer or his/her designee about the incident, including but not limited to: a description of the incident, the date of the incident, the date Vendor discovered or was informed of the incident, a description of the types of Protected Data involved, an estimate of the number of records affected, the schools within the District affected, what the Vendor has done or plans to do to investigate the incident, stop the breach and mitigate any further unauthorized access or release of Protected Data, and contact information for Vendor representatives who can assist affected individuals that may have additional questions. (d) Vendor acknowledges that upon initial notification from Vendor, the District, as the educational agency with which Vendor contracts, has an obligation under Section 2-d to in turn notify the Chief Privacy Officer in the New York State Education Department (“CPO”). Vendor agrees not to provide this notification to the CPO directly unless requested by the District or otherwise required by law. In the event the CPO contacts Vendor directly or requests more information from Vendor regarding the incident after having been initially informed of the incident by the District, Vendor will promptly inform Xxxxxx Xxx, Data Protection Officer or his/her designee.

  • Notice of Force Majeure If performance is delayed as a result of Force Majeure, the affected party shall provide prompt Notice to the other party and shall be excused from default or delay in performance while such circumstances prevail so long as such party continues to use commercially reasonable efforts to recommence performance as soon as possible.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.