Seller’s Breach Upon discovery by a Responsible Officer of the Master Servicer, the Securities Administrator or the Trustee or notice to the Master Servicer, the Securities Administrator or the Trustee of any defective or missing document (as described in the related Sale Agreement) in a Trustee Mortgage Loan File, or of any breach by any Seller of any representation, warranty or covenant under the related Sale Agreement, which defect or breach materially and adversely affects the value of any Mortgage Loan or the interest of the Trust therein (it being understood that any such defect or breach shall be deemed to have materially and adversely affected the value of the related Mortgage Loan or the interest of the Trust therein if the Trust incurs a loss as a result of such defect or breach),the parties discovering or receiving notice of such defect or breach shall notify the Securities Administrator. Upon discovering or receipt of notice of such breach, the Securities Administrator shall promptly request that such Seller cure such breach and, if such Seller does not cure such defect or breach in all material respects by the end of the cure period specified in such Sale Agreement and any extension of the cure period granted as permitted by such Sale Agreement, shall enforce such Seller’s obligation under such Sale Agreement to purchase such Mortgage Loan from the Trustee. In the event any Servicer has breached a representation or warranty under the related Servicing Agreement that is substantially identical to a representation or warranty breached by a Seller, the Securities Administrator shall first proceed against such Servicer. If such Servicer does not within 60 days (or such other period provided in the related Servicing Agreement) after notification of the breach, either take steps to cure such breach (which may be evidenced by a certificate asking for an extension of time in which to effectuate a cure) or complete the purchase of the Mortgage Loan, then (i) the Securities Administrator, shall enforce the obligations of the Seller under the related Sale Agreement to cure such breach or to purchase the Mortgage Loan from the Trust, and (ii) such Seller shall succeed to the rights of the Securities Administrator to enforce the obligations of the Servicer to cure such breach or repurchase such Mortgage Loan under the Servicing Agreement with respect to such Mortgage Loan. Notwithstanding the foregoing, however, if any breach of a representation or warranty by the Servicer or of a Seller is a Qualification Defect, a cure or purchase must take place within 75 days of the Defect Discovery Date.
Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article
SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.
Interconnection Customer Obligations The Interconnection Customer shall maintain the Large Generating Facility and the Interconnection Customer’s Interconnection Facilities in a safe and reliable manner and in accordance with this LGIA.
Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.
Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the
Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.
Transit Traffic 7.2.2.3.1 CenturyLink will accept traffic originated by CLEC’s network and/or its end user(s) for termination to other Telecommunications Carrier’s network and/or its end users that is connected to CenturyLink's Switch. CenturyLink will also terminate traffic from these other Telecommunications Carriers’ network and/or its end users to CLEC’s network and/or its end users. For purposes of the Agreement, transit traffic does not include traffic carried by Interexchange Carriers. That traffic is defined as Jointly Provided Switched Access. 7.2.2.3.2 The Parties involved in transporting transit traffic will deliver calls to each involved network with CCS/SS7 protocol and the appropriate ISUP/TCAP messages to facilitate full Interoperability and Billing functions. 7.2.2.3.3 The originating company is responsible for payment of appropriate rates to the transit company and to the terminating company. The Parties agree to enter into traffic exchange agreements with third party Telecommunications Carriers prior to delivering traffic to be transited to third party Telecommunications Carriers. In the event one Party originates traffic that transits the second Party’s network to reach a third party Telecommunications Carrier with whom the originating Party does not have a traffic exchange agreement, then the originating Party will indemnify, defend and hold harmless the second Party against any and all charges levied by such third party Telecommunications Carrier, including any termination charges related to such traffic and any attorneys fees and expenses. In the case of IntraLATA LEC Toll traffic where CenturyLink is the designated IntraLATA Toll provider for existing LECs, CenturyLink will be responsible for payment of appropriate usage rates. 7.2.2.3.4 When CenturyLink receives an unqueried call from CLEC to a telephone number that has been ported to another local services provider, the transit rate will apply in addition to any query rates. 7.2.2.3.5 In the case of a transit call that terminates in the Local Calling Area but in a different state than the call originated, and the CLEC does not have an agreement with CenturyLink in the state where the transit call terminated, CLEC must execute an agreement for that state if it is a state served by CenturyLink. In the absence of a second agreement, the transit rate in Exhibit A of this Agreement will be billed to the CLEC.
Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.
Exclusion de garanties A. Si vous êtes un client qui est un consommateur (quelqu’un qui utilise le Logiciel tvOS en dehors son commerce, entreprise ou profession), il se peut que vous bénéficiez, dans votre pays de résidence, de droits selon lesquels les limitations suivantes ne s’appliqueraient pas à vous. Dans les pays où ces limitations sont interdites, elles ne s’appliquent pas à vous. Pour en savoir plus sur vos droits, prenez contact avec un organisme local de conseil aux consommateurs. B. VOUS RECONNAISSEZ ET ACCEPTEZ EXPRESSÉMENT QUE, DANS LA MESURE PERMISE PAR LA LÉGISLATION APPLICABLE, L’UTILISATION DU LOGICIEL tvOS ET DE TOUT SERVICE FOURNI OU ACCESSIBLE PAR LEDIT LOGICIEL tvOS EST À VOS RISQUES ET PÉRILS ET QUE VOUS ASSUMEZ L’INTÉGRALITÉ DES RISQUES RELATIFS À LA QUALITÉ, AUX PERFORMANCES, À L’EXACTITUDE ET AUX EFFORTS. C. DANS LES LIMITES MAXIMALES AUTORISÉES PAR LA LÉGISLATION EN VIGUEUR, LE LOGICIEL tvOS ET LES SERVICES SONT FOURNIS « TELS QUELS » AVEC TOUS LEURS DÉFAUTS ET SANS AUCUNE GARANTIE D’AUCUNE SORTE. tvOS ET LES CONCÉDANTS D’APPLE (DÉSIGNÉS COLLECTIVEMENT PAR L’EXPRESSION « APPLE » AUX FINS DES DISPOSITIONS DES PARAGRAPHES 7 ET 8) EXCLUENT PAR LA PRÉSENTE LICENCE LA TOTALITÉ DES GARANTIES ET CONDITIONS, EXPLICITES, TACITES OU LÉGALES, Y COMPRIS DE FAÇON NON LIMITATIVE LES GARANTIES ET/OU CONDITIONS IMPLICITES DE QUALITÉ MARCHANDE, DE QUALITÉ SATISFAISANTE, D’ADÉQUATION À UN OBJECTIF PARTICULIER, D’EXACTITUDE, DE SÉRÉNITÉ D’UTILISATION ET DE NON EMPIÉTEMENT SUR LES DROITS DE TIERCES PARTIES, LE TOUT À L’ÉGARD DU LOGICIEL tvOS ET DES SERVICES. D. APPLE NE GARANTIT NULLEMENT L’ABSENCE DE TROUBLES LORS DE VOTRE UTILISATION DU LOGICIEL tvOS ET DES SERVICES, QUE LES FONCTIONS CONTENUES DANS LE LOGICIEL tvOS OU LES SERVICES EXÉCUTÉS OU FOURNIS PAR CELUI-CI CORRESPONDRONT À VOS BESOINS, QUE LE FONCTIONNEMENT DU LOGICIEL tvOS OU DES SERVICES SERA ININTERROMPU OU EXEMPT D’ERREUR, QUE TOUS LES SERVICES SERONT TOUJOURS DISPONIBLES, QUE TOUT DÉFAUT DU LOGICIEL tvOS OU DES SERVICES SERA CORRIGÉ OU QUE LE LOGICIEL tvOS SERA COMPATIBLE AVEC TOUT AUTRE LOGICIEL, APPLICATION OU SERVICE TIERS. L’INSTALLATION DU LOGICIEL tvOS PEUT AFFECTER LA DISPONIBILITÉ ET L’UTILISATION DE LOGICIELS, APPLICATIONS OU SERVICES XX XXXXXX PARTIE, AINSI QUE DE PRODUITS ET SERVICES APPLE. E. VOUS RECONNAISSEZ ÉGALEMENT QUE LE LOGICIEL tvOS ET LES SERVICES NE SONT NI DESTINÉS NI ADAPTÉS À UN USAGE DANS DES SITUATIONS OU DES ENVIRONNEMENTS OÙ UNE DÉFAILLANCE, DES ERREURS OU DES INEXACTITUDES DU CONTENU, DES DONNÉES OU DES INFORMATIONS FOURNIS PAR LE LOGICIEL tvOS OU LES SERVICES RISQUENT D’ENTRAÎNER DES BLESSURES, DES ACCIDENTS XXXXXX OU MORTELS POUR LES PERSONNES OU DES DOMMAGES PHYSIQUES OU ENVIRONNEMENTAUX. CES SITUATIONS COMPRENNENT NOTAMMENT LE FONCTIONNEMENT D’INSTALLATIONS NUCLÉAIRES, LA NAVIGATION OU LES SYSTÈMES DE COMMUNICATION AÉRIENS, LE CONTRÔLE AÉRIEN, LES SYSTÈMES D’ENTRETIEN ARTIFICIEL DE LA VIE OU LES SYSTÈMES D’ARMEMENT.