Prevention of Unauthorized Production and Theft Sample Clauses

Prevention of Unauthorized Production and Theft. During the term of this Agreement and any extended term hereof, Subcontractor will take all necessary measures to prevent the theft or loss from Subcontractor’s facilities of all Products being manufactured for Manufacturer (including all component parts thereof), and Property. Subcontractor will also take all necessary measures to prevent the unauthorized production of Products and Property in Subcontractor’s facilities (“overruns”) and the entry of such products into the marketplace. Subcontractor also agrees to assist Manufacturer and/or Callaway Golf in their efforts to prevent counterfeiting of Callaway Golf products and Property by immediately reporting to Manufacturer and Callaway Golf any information it obtains concerning the counterfeiting of Callaway Golf products and Property, and by cooperating fully in any investigations by Manufacturer and/or Callaway Golf of the counterfeiting of Callaway Golf products and Property. *** CONFIDENTIAL TREATMENT REQUESTED *** In the event that Manufacturer and/or Callaway Golf finds it necessary to investigate theft or loss of its products and other Property from Subcontractor, or establishes that overruns produced by Subcontractor are available in the marketplace, Manufacturer and Callaway Golf will be entitled to recover from Subcontractor (e.g. by price reduction, credit, offset, invoice, or otherwise) all its investigative costs, as well as all attorney fees required to oversee said investigations, to include attorney fees associated with any civil or criminal litigation that might result. Subcontractor also agrees that, for each component recovered by Callaway Golf or law enforcement authorities that can be established as either having been stolen from Subcontractor, or manufactured on Subcontractor’s premises as “overrun” product, Callaway Golf will be entitled to reimbursement by Subcontractor at a rate of two times the purchase price normally paid to Subcontractor by Callaway Golf for the component in question.
AutoNDA by SimpleDocs

Related to Prevention of Unauthorized Production and Theft

  • PREVENTION OF BRIBERY 26.1 The Supplier represents and warrants that neither it, nor to the best of its knowledge any Supplier's Personnel, have at any time prior to the Commencement Date: (a) committed a Prohibited Act or been formally notified that it is subject to an investigation or prosecution which relates to an alleged Prohibited Act; and/or (b) been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act. 26.2 The Supplier shall not during the term of this agreement: (a) commit a Prohibited Act; and/or (b) do or suffer anything to be done which would cause the Authority or any of the Authority's employees, consultants, contractors, sub-contractors or agents to contravene any of the Bribery Act or otherwise incur any liability in relation to the Bribery Act. 26.3 The Supplier shall during the term of this agreement: (a) establish, maintain and enforce, and require that its Sub- contractors establish, maintain and enforce, policies and procedures which are adequate to ensure compliance with the Bribery Act and prevent the occurrence of a Prohibited Act; and (b) keep appropriate records of its compliance with its obligations under clause 26.3(a) and make such records available to the Authority on request. 26.4 The Supplier shall immediately notify the Authority in writing if it becomes aware of any breach of clause 26.1 and/or clause 26.2, or has reason to believe that it has or any of the Supplier's Personnel have: (a) been subject to an investigation or prosecution which relates to an alleged Prohibited Act; (b) been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act; and/or (c) received a request or demand for any undue financial or other advantage of any kind in connection with the performance of this agreement or otherwise suspects that any person or Party directly or indirectly connected with this agreement has committed or attempted to commit a Prohibited Act. 26.5 If the Supplier makes a notification to the Authority pursuant to clause 26.4, the Supplier shall respond promptly to the Authority's enquiries, co-operate with any investigation, and allow the Authority to audit any books, records and/or any other relevant documentation in accordance with clause 22. 26.6 If the Supplier is in Default under clause 26.1 and/or clause 26.2, the Authority may by notice: (a) require the Supplier to remove from performance of this agreement any Supplier's Personnel whose acts or omissions have caused the Default; or (b) immediately terminate this agreement. 26.7 Any notice served by the Authority under clause 26.6 shall specify the nature of the Prohibited Act, the identity of the Party who the Authority believes has committed the Prohibited Act and the action that the Authority has elected to take (including, where relevant, the date on which this agreement shall terminate).

  • Prevention of Corruption The Contractor shall not offer, give, or agree to give anything, to any person an inducement or reward for doing, refraining from doing, or for having done or refrained from doing, any act in relation to the obtaining or execution of the Contract or for showing or refraining from showing favour or disfavour to any person in relation to the Contract.

  • Musculoskeletal Injury Prevention and Control The hospital in consultation with the Joint Health and Safety Committee (JHSC) shall develop, establish and put into effect, musculoskeletal prevention and control measures, procedures, practices and training for the health and safety of employees.

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

  • Investigation and Prevention DST shall reasonably assist Fund in investigating of any such unauthorized access and shall use commercially reasonable efforts to: (A) cooperate with Fund in its efforts to comply with statutory notice or other legal obligations applicable to Fund or its clients arising out of unauthorized access and to seek injunctive or other equitable relief; (B) cooperate with Fund in litigation and investigations against third parties reasonably necessary to protect its proprietary rights; and (C) take reasonable actions necessary to mitigate loss from any such authorized access.

  • Fraud Prevention A. To screen its employees and contractors to determine if they have been excluded from Medicare, Medicaid or any federal or state health care program. The Contractor agrees to search monthly the HHS-Office of Inspector General ("OIG") and Texas Health and Human Services Commission Office of Inspector General ("HHSC-OIG") List of Excluded Individuals/Entities ("LEIE") websites to capture exclusions and reinstatements that have occurred since the last search and to immediately report to HHSC-OIG any exclusion information the Contractor discovers. Exclusionary searches for prospective employees and contractors shall be performed prior to employment or contracting. B. That no Medicaid payments can be made for any items or services directed or prescribed by a physician or other authorized person who is excluded from Medicare, Medicaid or any federal or state health care program when the individual or entity furnishing the items or services either knew or should have known of the exclusion. This prohibition applies even when the Medicaid payment itself is made to another contractor, practitioner or supplier who is not excluded. C. That this contract is subject to all state and federal laws and regulations relating to fraud and abuse in health care and the Medicaid program. As required by 42 C.F.R. §431.107, the Contractor agrees to keep all records necessary to disclose the extent of services the Contractor furnishes to people in the Medicaid program and any information relating to payments claimed by the Contractor for furnishing Medicaid services. On request, the Contractor also agrees to furnish HHSC, AG-MFCU, or HHS any information maintained under 42 C.F.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!