Regarding Munich Re, U.S Sample Clauses

Regarding Munich Re, U.S. (Life) Representatives. Munich Re, U.S. (Life) shall be responsible if Customer Information provided by Munich Re, U.S. (Life) to the Representative is the source of a breach in confidentiality. Munich Re, U.S. (Life) shall be liable for such breach to the same extent as provided above in this Article 21. Further, such liability shall be limited as provided above in this Article 21. Notwithstanding the preceding, Munich Re, U.S. (Life)’s responsibility is limited to instances where Customer Information is transmitted to a Representative at Munich Re, U.S. (Life)’s request or direction under the terms of this Agreement using an encrypted basis using encryption methods and software generally accepted and customarily used in the insurance industry. Munich Re, U.S. (Life) shall have no responsibility for Customer Information lost in transmission, except where an error in written instructions provided by the Representative, or an act or omission of the Representative during transmission, causes such loss of Customer Information. Munich Re, U.S. (Life) will have no responsibility for the loss or a breach of Customer Information transmitted to a Representative pursuant to a separate agreement between Ceding Company and Representative, even if the Customer Information is the same as information Munich Re, U.S. (Life) previously requested or directed Ceding Company to provide to the Representative. If the circumstances are such that a breach of Customer Information occurs as a result of loss by a Representative of Customer Information provided both pursuant to and independently of a request or direction by Munich Re, U.S. (Life), and the information provided independently is alone sufficient to cause the breach, the Ceding Company agrees that it shall not seek indemnification from Munich Re, U.S. (Life) under the terms of this Agreement but rather, would seek indemnification from the Representative(s) pursuant to agreements in place with said Representative(s) or by other means. In any event, the Ceding Company will not seek to recover more than once for Customer Information obtained by a Representative from more than one source and lost in the same occurrence of breach. Treaty #4347 Munich American Reassurance Company P a g e | 41
AutoNDA by SimpleDocs

Related to Regarding Munich Re, U.S

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • Documentation License Subject to the terms of this Agreement, Flock hereby grants to Agency a non- exclusive, non-transferable right and license to use the Documentation during the Term in connection with its use of the Services as contemplated herein, and under Section 2.5 below.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Happen After We Receive Your Letter When we receive your letter, we must do two things:

  • Bachelor’s Degree A four-year baccalaureate degree is recommended; however, applicants who complete a minimum of 90 semester or 135 quarter units of undergraduate study will qualify for admission. To be eligible to apply, the applicant must be on track to complete the required units through the summer term that precedes fall matriculation.

  • What Will Happen After We Receive Your Letter When we receive your letter, we must do two things:

  • E1 Authority Data E1.1 The Contractor shall not delete or remove any proprietary notices contained within or relating to the Authority Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!