We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Acknowledgment and Consent to Bail-In of EEA Financial Institutions Notwithstanding anything to the contrary in any Loan Document or in any other agreement, arrangement or understanding among any such parties, each party hereto acknowledges that any liability of any EEA Financial Institution arising under any Loan Document may be subject to the Write-Down and Conversion Powers of an EEA Resolution Authority and agrees and consents to, and acknowledges and agrees to be bound by: (a) the application of any Write-Down and Conversion Powers by an EEA Resolution Authority to any such liabilities arising hereunder which may be payable to it by any party hereto that is an EEA Financial Institution; and (b) the effects of any Bail-In Action on any such liability, including, if applicable: (i) a reduction in full or in part or cancellation of any such liability; (ii) a conversion of all, or a portion of, such liability into shares or other instruments of ownership in such EEA Financial Institution, its parent entity, or a bridge institution that may be issued to it or otherwise conferred on it, and that such shares or other instruments of ownership will be accepted by it in lieu of any rights with respect to any such liability under this Agreement or any other Loan Document; or (iii) the variation of the terms of such liability in connection with the exercise of the Write-Down and Conversion Powers of any EEA Resolution Authority.
Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.
Acknowledgement and Consent to Bail-In of EEA Financial Institutions Notwithstanding anything to the contrary in any Loan Document or in any other agreement, arrangement or understanding among any such parties, each party hereto acknowledges that any liability of any EEA Financial Institution arising under any Loan Document, to the extent such liability is unsecured, may be subject to the write-down and conversion powers of an EEA Resolution Authority and agrees and consents to, and acknowledges and agrees to be bound by: (a) the application of any Write-Down and Conversion Powers by an EEA Resolution Authority to any such liabilities arising hereunder which may be payable to it by any party hereto that is an EEA Financial Institution; and (b) the effects of any Bail-in Action on any such liability, including, if applicable: (i) a reduction in full or in part or cancellation of any such liability; (ii) a conversion of all, or a portion of, such liability into shares or other instruments of ownership in such EEA Financial Institution, its parent undertaking, or a bridge institution that may be issued to it or otherwise conferred on it, and that such shares or other instruments of ownership will be accepted by it in lieu of any rights with respect to any such liability under this Agreement or any other Loan Document; or (iii) the variation of the terms of such liability in connection with the exercise of the write-down and conversion powers of any EEA Resolution Authority.
Authorization of Transaction The Buyer has full power and authority (including full corporate power and authority) to execute and deliver this Agreement and to perform its obligations hereunder. This Agreement constitutes the valid and legally binding obligation of the Buyer, enforceable in accordance with its terms and conditions. The Buyer need not give any notice to, make any filing with, or obtain any authorization, consent, or approval of any government or governmental agency in order to consummate the transactions contemplated by this Agreement.
Authorization of Transactions The Company is a corporation duly authorized and in good standing in the State of Florida and has the requisite power and capacity to execute and deliver the Transaction Documents to which it is a party and to perform its obligations hereunder and thereunder. The execution, delivery and performance by the Company of the applicable Transaction Documents and the consummation of the Transactions have been duly and validly authorized by all requisite action on the part of the Company. The Transaction Documents to which the Company is a party have been duly and validly executed and delivered by The Company. Each Transaction Document to which the Company is a party constitutes the valid and legally binding obligation of the Company, enforceable against the Company in accordance with its terms and conditions, except to the extent enforcement thereof may be limited by applicable bankruptcy, insolvency or other Laws affecting the enforcement of creditors’ rights or by the principles governing the availability of equitable remedies.
Acknowledgment Regarding Any Supported QFCs To the extent that the Loan Documents provide support, through a guarantee or otherwise, for any Swap Contract or any other agreement or instrument that is a QFC (such support, “QFC Credit Support”, and each such QFC, a “Supported QFC”), the parties acknowledge and agree as follows with respect to the resolution power of the Federal Deposit Insurance Corporation under the Federal Deposit Insurance Act and Title II of the Xxxx-Xxxxx Xxxx Street Reform and Consumer Protection Act (together with the regulations promulgated thereunder, the “U.S. Special Resolution Regimes”) in respect of such Supported QFC and QFC Credit Support (with the provisions below applicable notwithstanding that the Loan Documents and any Supported QFC may in fact be stated to be governed by the laws of the State of New York and/or of the United States or any other state of the United States): In the event a Covered Entity that is party to a Supported QFC (each, a “Covered Party”) becomes subject to a proceeding under a U.S. Special Resolution Regime, the transfer of such Supported QFC and the benefit of such QFC Credit Support (and any interest and obligation in or under such Supported QFC and such QFC Credit Support, and any rights in property securing such Supported QFC or such QFC Credit Support) from such Covered Party will be effective to the same extent as the transfer would be effective under the U.S. Special Resolution Regime if the Supported QFC and such QFC Credit Support (and any such interest, obligation and rights in property) were governed by the laws of the United States or a state of the United States. In the event a Covered Party or a BHC Act Affiliate of a Covered Party becomes subject to a proceeding under a U.S. Special Resolution Regime, Default Rights under the Loan Documents that might otherwise apply to such Supported QFC or any QFC Credit Support that may be exercised against such Covered Party are permitted to be exercised to no greater extent than such Default Rights could be exercised under the U.S. Special Resolution Regime if the Supported QFC and the Loan Documents were governed by the laws of the United States or a state of the United States. Without limitation of the foregoing, it is understood and agreed that rights and remedies of the parties with respect to a Defaulting Lender shall in no event affect the rights of any Covered Party with respect to a Supported QFC or any QFC Credit Support.
Comptroller General Examination of Record The Contractor shall comply with the provisions of this paragraph (d) if this contract was awarded using other than sealed bid, is in excess of the simplified acquisition threshold, as defined in FAR 2.101, on the date of award of this contract, and does not contain the clause at 52.215-2, Audit and Records-Negotiation. (1) The Comptroller General of the United States, or an authorized representative of the Comptroller General, shall have access to and right to examine any of the Contractor’s directly pertinent records involving transactions related to this contract. (2) The Contractor shall make available at its offices at all reasonable times the records, materials, and other evidence for examination, audit, or reproduction, until 3 years after final payment under this contract or for any shorter period specified in FAR subpart 4.7, Contractor Records Retention, of the other clauses of this contract. If this contract is completely or partially terminated, the records relating to the work terminated shall be made available for 3 years after any resulting final termination settlement. Records relating to appeals under the disputes clause or to litigation or the settlement of claims arising under or relating to this contract shall be made available until such appeals, litigation, or claims are finally resolved. (3) As used in this clause, records include books, documents, accounting procedures and practices, and other data, regardless of type and regardless of form. This does not require the Contractor to create or maintain any record that the Contractor does not maintain in the ordinary course of business or pursuant to a provision of law. (1) Notwithstanding the requirements of the clauses in paragraphs (a), (b), (c), and (d) of this clause, the Contractor is not required to flow down any FAR clause, other than those in this paragraph (e)(1) in a subcontract for commercial items. Unless otherwise indicated below, the extent of the flow down shall be as required by the clause- (i) 52.203-13, Contractor Code of Business Ethics and Conduct (JUN 2020) (41 U.S.C. 3509). (ii) 52.203-19, Prohibition on Requiring Certain Internal Confidentiality Agreements or Statements (Jan 2017) (section 743 of Division E, Title VII, of the Consolidated and Further Continuing Appropriations Act, 2015 (Pub. L. 113-235) and its successor provisions in subsequent appropriations acts (and as extended in continuing resolutions)).
Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements
No Solicitation of Transactions (a) The Company agrees that neither it nor any Company Subsidiary shall, and that it shall cause its and each Company Subsidiary's Representatives not to, directly or indirectly, initiate, solicit, encourage or otherwise facilitate (including by way of furnishing information) any inquiries or the making of any proposal, or offer with respect to a merger, reorganization, share exchange, consolidation, business combination, recapitalization, liquidation, dissolution or similar transaction involving, or any purchase or sale of all or any significant portion of the assets or 20% or more of the equity securities of, the Company or any Company Subsidiary that, in any such case, could reasonably be expected to interfere with the completion of the Merger or the other transactions contemplated by this Agreement (any such proposal or offer being hereinafter referred to as an "Acquisition Proposal"). The Company further agrees that neither it nor any Company Subsidiary shall, and that it shall cause its and each Company Subsidiary's Representatives not to, directly or indirectly, have any discussion with or provide any confidential information or data to any Person relating to an Acquisition Proposal or engage in any negotiations concerning an Acquisition Proposal, or otherwise facilitate any effort or attempt to make or implement an Acquisition Proposal or accept an Acquisition Proposal; provided, however, that nothing contained in this Agreement shall prevent the Company or the Company's Board of Directors from (i) complying with Rule 14e-2 promulgated under the Exchange Act with regard to an Acquisition Proposal; (ii) engaging in any discussions or negotiations with, or providing any information to, any Person in response to an unsolicited bona fide written Acquisition Proposal by any such Person; or (iii) recommending such an unsolicited bona fide written Acquisition Proposal to the holders of Company Common Stock if and only to the extent that, in any such case as is referred to in clause (ii) or (iii), (A) the Company's Board of Directors concludes in good faith (after consultation with its legal counsel and financial advisors) that such Acquisition Proposal is reasonably capable of being completed, taking into account all legal, financial, regulatory and other aspects of the Acquisition Proposal and the Person making the Acquisition Proposal, and would, if consummated, result in a transaction more favorable to holders of Company Common Stock than the transaction contemplated by this Agreement (any such more favorable Acquisition Proposal being hereinafter referred to as a "Superior Proposal"), (B) the Company's Board of Directors determines in good faith after consultation with legal counsel that such action is necessary for it to act in a manner consistent with its fiduciary duties under applicable law, (C) prior to providing any information or data to any Person in connection with a Superior Proposal by any such Person, the Company's Board of Directors receives from such Person an executed confidentiality agreement on terms substantially similar to those contained in the Confidentiality Agreement and (D) prior to providing any information or data to any Person or entering into discussions or negotiations with any Person, the Company's Board of Directors notifies IHK promptly of such inquiries, proposals or offers received by, any such information requested from, or any such discussions or negotiations sought to be initiated or continued with, the Company, any Company Subsidiary or any of their Representatives indicating, in connection with such notice, the name of such Person and the terms and conditions of any proposals or offers. The Company agrees that it will immediately cease and cause to be terminated any existing activities, discussions or negotiations with any parties conducted heretofore with respect to any Acquisition Proposal. The Company agrees that it shall keep IHK informed, on a current basis, of the status and terms of any such proposals or offers and the status of any such discussions or negotiations. (b) The Company agrees that it will take the necessary steps to promptly inform each Company Subsidiary and each Representative of the Company or any Company Subsidiary of the obligations undertaken in this Section 6.05.
Privacy and Data Security (a) In the prior three (3) years, the Company and its Subsidiaries have been in compliance with Privacy Laws, and in all material respects with (i) Contracts (or portions thereof) between the Company or its Subsidiaries and other Persons relating to Personal Data and (ii) applicable written policies, public statements and other public representations relating to the Processing of Personal Data, inclusive of all disclosures required by applicable Privacy Laws (“Privacy and Data Security Policies,” and together with Privacy Laws and such Contracts, “Privacy Commitments”). The execution, delivery and performance by the Company of this Agreement to which the Company is or will be a party, and the consummation of the transactions contemplated hereby or thereby, are not reasonably expected to, directly or indirectly, result in a violation of any Privacy Commitments that would be materially adverse to the Company and its Subsidiaries, taken as a whole. (b) In the prior three (3) years, the Privacy and Data Security Policies have at all times been maintained and made available to individuals in accordance with reasonable industry practices and as required by Privacy Laws, are accurate and complete and are not misleading or deceptive (including by omission). The practices of the Company or its Subsidiaries with respect to the Processing of Personal Data conform in all material respects to the Privacy and Data Security Policies that govern such Personal Data. (c) There is (and in the prior three years there has been) no material Legal Proceeding pending or, to the Company’s knowledge, threatened against or involving the Company or its Subsidiaries initiated by any Person (including (i) the Federal Trade Commission, any state attorney general or similar state official, (ii) any other Governmental authority, foreign or domestic or (iii) any regulatory or self-regulatory entity) alleging that any Processing of Personal Data by or on behalf of the Company or its Subsidiaries is or was in violation of any Privacy Commitments. To the Company’s Knowledge, there are no facts, circumstances or conditions that would reasonably be expected to form the basis for any proceeding for any potential violation of any Privacy Commitments. (d) In the prior three (3) years, (i) there has been no unauthorized access to, or unauthorized use, disclosure, or Processing of Personal Data in the possession or control of the Company or its Subsidiaries or any of its contractors with regard to any Personal Data obtained from or on behalf of the Company or its Subsidiaries (“Security Incident”), (ii) there have been no unauthorized intrusions or breaches of security into any Company IT Systems, and (iii) none of the Company or any of its Subsidiaries has notified or been required to notify any Person of any (A) loss, theft or damage of, or (B) other unauthorized or unlawful access to, or use, disclosure or other Processing of, Personal Data, except, in each case of clauses (i), (ii), and (iii), as would not have a Company Material Adverse Effect. Each of the Company and its Subsidiaries has implemented commercially reasonable administrative, physical and technical safeguards, and ensures that its contractors processing Personal Data take such safeguards to protect the confidentiality, integrity and security of Personal Data against any Security Incident, including taking all reasonable steps to safeguard and back up Personal Data. (e) Each of the Company and its Subsidiaries owns or has a license or other right to use the Company IT Systems as necessary to operate the business of each the Company or its Subsidiaries as currently conducted. All Company IT Systems are (i) free from any defect, bug, virus or programming, design or documentation error and (ii) in sufficiently good working condition to effectively perform all information technology operations necessary for the operation of businesses of the Company and its Subsidiaries (except for ordinary wear and tear), except in each case of clauses (i) and (ii), as is not and would not reasonably be expected to be, individually or in the aggregate, material to the Company and its Subsidiaries, taken as a whole. In the prior three years, there have not been any material failures, breakdowns or continued substandard performance of any Company IT Systems that have caused a material failure or disruption of the Company IT Systems other than routine failures or disruptions that have been remediated in the Ordinary Course of Business. In the past three (3) years, there have been no (except to the extent completely remediated), and to the Company’s Knowledge, there are no material security deficiencies or vulnerabilities in the Company IT Systems.