SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.
Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Anti-Terrorism The Contractor agrees to undertake all reasonable efforts to ensure that none of the UNDP funds received under the Contract is used to provide support to individuals or entities associated with terrorism and that recipients of any amounts provided by UNDP hereunder do not appear on the list maintained by the Security Council Committee established pursuant to Resolution 1267 (1999). The list can be accessed via xxxxx://xxx.xx.xxx/sc/suborg/en/sanctions/1267/aq_sanctions_list. This provision must be included in all sub-contracts or sub-agreements entered into under the Contract.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Anti-Dilution Protection (a) In the event, prior to the payment of this Note, Aspen shall issue any of its shares of Aspen Common Stock as a stock dividend or shall subdivide the number of outstanding shares of Aspen Common Stock into a greater number of shares, then, in either of such events, the shares obtainable pursuant to conversion of this Note shall be increased proportionately; and, conversely, in the event that Aspen shall reduce the number of outstanding shares of Aspen Common Stock by combining such shares into a smaller number of shares, then, in such event, the number of shares of Aspen Common Stock obtainable pursuant to the conversion of this Note shall be decreased proportionately. Any dividend paid or distributed upon Aspen Common Stock in shares of any other class of capital stock of Aspen or securities convertible into shares of Aspen Common Stock shall be treated as a dividend paid in Aspen Common Stock to the extent that the shares of Aspen Common Stock are issuable upon the conversion of the Note. In the event that Aspen shall pay a dividend consisting of the securities of any other entity or in cash or other property, upon conversion of this Note, the Holder shall receive the securities, cash, or property which the Holder would have been entitled to if the Holder had converted this Note immediately prior to the record date of such dividend. (b) In the event, prior to the payment of this Note, Aspen shall be recapitalized by reclassifying its outstanding Aspen Common Stock (other than into shares of common stock with a different par value, or by changing its outstanding shares of common stock to shares without par value), or in the event Aspen or a successor corporation, partnership, limited liability company or other entity (any of which is defined as a “Corporation”) shall consolidate or merge with or convey all or substantially all of its, or of any successor Corporation’s property and assets to any other Corporation or Corporations (any such other Corporation being included within the meaning of the term “successor Corporation” used in the context of any consolidation or merger of any other Corporation with, or the sale of all or substantially all of the property of any such other Corporation to, another Corporation or Corporations), or in the event of any other material change in the capital structure of Aspen or of any successor Corporation by reason of any reclassification, reorganization, recapitalization, consolidation, merger, conveyance or otherwise, then, as a condition of any such reclassification, reorganization, recapitalization, consolidation, merger or conveyance, a prompt, proportionate, equitable, lawful and adequate provision shall be made whereby the Holder of this Note shall thereafter have the right to receive, upon the basis and the terms and conditions specified in this Note, in lieu of the securities of Aspen theretofore issuable upon the conversion of this Note, such shares, securities or assets as may be issued or payable with respect to or in exchange for the number of securities of Aspen theretofore obtainable upon conversion of this Note as provided above had such reclassification, reorganization, recapitalization, consolidation, merger or conveyance not taken place; and in any such event, the rights of the Holder of this Note to any adjustment in the number of shares of Aspen Common Stock obtainable upon conversion of this Note, as provided, shall continue and be preserved in respect of any shares, securities or assets which the Holder becomes entitled to obtain. Notwithstanding anything herein to the contrary, this Section 3(b) shall not apply to a merger with a subsidiary provided Aspen is the continuing Corporation and provided further such merger does not result in any reclassification, capital reorganization or other change of the securities issuable under this Note. The foregoing provisions of this Section 3(b) shall apply to successive reclassification, capital reorganizations and changes of securities and to successive consolidation, mergers, sales or conveyances. (c) In the event Aspen, at any time while this Note shall remain outstanding, shall sell all or substantially all of its assets, or dissolve, liquidate, or wind up its affairs, prompt, proportionate, equitable, lawful and adequate provision shall be made as part of the terms of any such sale, dissolution, liquidation, or winding up such that the Holder of this Note may thereafter receive, upon exercise hereof, in lieu of the securities of Aspen which it would have been entitled to receive, the same kind and amount of any shares, securities or assets as may be issuable, distributable or payable upon any such sale, dissolution, liquidation or winding up with respect to each share of Aspen Common Stock; provided, however, that in the event of any such sale, dissolution, liquidation or winding up, the right to convert this Note shall terminate on a date fixed by Aspen, such date so fixed to be not earlier than 6:00 p.m., New York time, on the 30th day after the date on which notice of such termination of the right to convert this Note has been given by mail to the Holder of this Note at such Holder’s address as it appears on the books of Aspen.
Violence (a) The parties agree that violence shall be defined as any incident in which an employee is abused, threatened or assaulted while performing his or her work. The parties agree it includes the application of force, threats with or without weapons and severe verbal abuse. The parties agree that such incidents will not be condoned. Any employee who believes he/she has been subjected to such incident shall report this to a supervisor who will make every reasonable effort to rectify the situation. For purposes of sub- article (a) only, employees as referred to herein shall mean all employees of the Employer. (b) The Employer agrees to develop formalized policies and procedures in consultation with the Joint Health and Safety Committee to deal with workplace violence. The policy will address the prevention of violence and the management of violent situations and support to employees who have faced workplace violence. These policies and procedures shall be communicated to all employees. (c) The Employer will report all incidents of violence as defined herein to the Joint Health and Safety Committee for review. (d) The Employer agrees to provide training and information on the prevention of violence to all employees who come into contact with potentially aggressive persons. This training will be done during a new employee’s orientation and updated as required. (e) Subject to appropriate legislation, and with the employee’s consent, the Employer will inform the Union within three (3) days of any employee who has been subjected to violence while performing his/her work. Such information shall be submitted in writing to the Union as soon as practicable.
Review of legality and data minimisation (a) The data importer agrees to review the legality of the request for disclosure, in particular whether it remains within the powers granted to the requesting public authority, and to challenge the request if, after careful assessment, it concludes that there are reasonable grounds to consider that the request is unlawful under the laws of the country of destination, applicable obligations under international law and principles of international comity. The data importer shall, under the same conditions, pursue possibilities of appeal. When challenging a request, the data importer shall seek interim measures with a view to suspending the effects of the request until the competent judicial authority has decided on its merits. It shall not disclose the personal data requested until required to do so under the applicable procedural rules. These requirements are without prejudice to the obligations of the data importer under Clause 14(e). (b) The data importer agrees to document its legal assessment and any challenge to the request for disclosure and, to the extent permissible under the laws of the country of destination, make the documentation available to the data exporter. It shall also make it available to the competent supervisory authority on request.
Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.