WAGE VIOLATIONS Contractor represents and warrants that, during the term of this Master Contract and the three (3) year period immediately preceding the award of the Master Contract, it is not determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW chapters 49.46, 49.48, or 49.52.
Reporting Violations You must immediately report any known violation of the District’s applicable policies, Internet safety plan, or acceptable use guidelines to a supervising teacher (if student) or the technology coordinator. • You must report to a supervising teacher (if student) or the technology coordinator any requests for personally identifying information or contact from unknown individuals, as well as any content or communication that is abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. User’s Name (printed):
Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.
Non-Violation The execution and delivery of this Amendment and the performance and observance by it of the terms and provisions hereof (a) do not violate or contravene its Organization Documents or any applicable Laws or (b) conflict with or result in a breach or contravention of any provision of, or constitute a default under, any other agreement, instrument or document binding upon or enforceable against it.
Repeat Violations Xxxxxxx agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.
Privacy Compliance The Provider shall comply with all applicable federal, state, and local laws, rules, and regulations pertaining to Student Data privacy and security, all as may be amended from time to time.
Privacy Policies Each party will make available a Privacy Policy that complies with Law. Xxxxxx’s Privacy Policy explains how and for what purposes Stripe collects, uses, retains, discloses and safeguards the Personal Data you provide to Stripe.
Privacy Matters (a) Caza covenants and agrees to advise the Offeror of all purposes for which the Transferred Information was initially collected from or in respect of the individual to which such Transferred Information relates and all additional purposes where Caza has notified the individual of such additional purpose, and where required by law, obtained the consent of such individual to such use or disclosure. (b) The Offeror covenants and agrees to: (i) prior to the completion of the transactions contemplated herein, collect, use and disclose the Transferred Information solely for the purpose of reviewing and completing the transactions contemplated herein, including the determination to complete such transactions; (ii) after the completion of the transactions contemplated herein: (a) collect, use and disclose the Transferred Information only for those purposes for which the Transferred Information was initially collected from or in respect of the individual to which such Transferred Information relates or for the completion of the transactions contemplated herein, unless: (i) Caza or the Offeror has first notified such individual of such additional purpose, and where required by law, obtained the consent of such individual to such additional purpose, or (ii) such use or disclosure is permitted or authorized by law, without notice to, or consent from, such individual; (b) where required by law, promptly notify the individuals to whom the Transferred Information relates that the transactions contemplated herein have taken place and that the Transferred Information has been disclosed to the Offeror, and (c) return or destroy the Transferred Information, at the option of Caza, should the transactions contemplated herein not be completed.
Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.
Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.