Security Violation Sample Clauses

Security Violation. An act from within an organization that bypasses or disobeys security policies, practices, or procedures. Sensitive data is a special category of personally identifiable information (PII) that has the potential to cause great harm to an individual, government agency, or program if abused, misused, or breached. It is sensitive information protected against unwarranted disclosure and carries specific criminal and civil penalties for an individual convicted of unauthorized access, disclosure, or misuse. Protection of sensitive information usually involves specific classification or legal precedents that provide special protection for legal and ethical reasons. SIM is software that automates the collection of event log data from security devices such as firewalls, proxy servers, intrusion detection systems and anti-virus software. The SIM translates the data into correlated and simplified formats. SMDS is a telecommunications service that provides connectionless, high- performance, packet- switched data transport. Although not a protocol, it supports standard protocols and communications interfaces using current technology. Synonymous with “SSA-supplied data/information‟, defines information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. The following are examples of SSA-provided data/information:  SSA’s response to a request from an EIEP for information from SSA (e.g., date of death) This term, sometimes used interchangeably with “SSA-provided data/information,‟ denotes information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. However, “SSA data/information” also includes information provided to the EIEP by a source other than SSA, but which the EIEP attests to that SSA verified it, or the EIEP couples the information with data from SSA as to to certify the accuracy of the information. The following are examples of SSA information:  SSA’s response to a request from an EIEP for information from SSA (e.g., date of death)  Display by the EIEP of SSA’s response to a query for verification of an SSN and the associated SSN provided by SSA  Display by the EIEP of SSA’s response to a query for verification of an SSN and the associated SSN provided to the EIEP by a source other than SSA  Electronic records that contain only SSA’s response to a query for verification of an SSN and the associated SSN whether provided to th...
AutoNDA by SimpleDocs
Security Violation. Recipient shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Contract is detected, or if Recipient suspects that the security or integrity of TWC Information has or may have been compromised in any way.
Security Violation. If any activity violating the Platform's security or threatening the integrity of user data or Netzo is detected.
Security Violation. The Member is prohibited from violating or attempting to violate the security of the Site including, without limitation, accessing data not intended for them or logging into a server or account which they are not authorized to access, attempting to probe, scan or test the vulnerability of a system or network or attempting to breach security or authentication measures without proper authorization, attempting to interfere with service to any Member, host or network or sending unsolicited e-mail. Violation of the system or network security may result in civil or criminal liability.
Security Violation. Board and Board subcontractor shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Agreement is detected, or if Board or Board subcontractor suspects that the security or integrity of TWC Information has or may have been compromised in any way. The time period for notifying TWC under this section is reduced to one (1) hour for suspected security violations that involve protected health information of a covered under 45 C.F.R. Parts 160, 162, and 164, such as Medicaid Information provided from, by or accessed through the Health and Human Services Commission systems as required by the Health Information and Portability and Accountability Act (HIPAA) and the Health Information Technology Act (HITECH).

Related to Security Violation

  • Non-Violation The execution and delivery of this Amendment and the performance and observance by it of the terms and provisions hereof (a) do not violate or contravene its Organization Documents or any applicable Laws or (b) conflict with or result in a breach or contravention of any provision of, or constitute a default under, any other agreement, instrument or document binding upon or enforceable against it.

  • WAGE VIOLATIONS Contractor represents and warrants that, during the term of this Master Contract and the three (3) year period immediately preceding the award of the Master Contract, it is not determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW chapters 49.46, 49.48, or 49.52.

  • Repeat Violations Xxxxxxx agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • AIR OR WATER POLLUTION VIOLATION Under the State laws, the Contractor shall not be: (1) in violation of any order or resolution not subject to review promulgated by the State Air Resources Board or an air pollution control district; (2) subject to cease and desist order not subject to review issued pursuant to Section 13301 of the Water Code for violation of waste discharge requirements or discharge prohibitions; or (3) finally determined to be in violation of provisions of federal law relating to air or water pollution.

  • Reporting Violations You must immediately report any known violation of the District’s applicable policies, Internet safety plan, or acceptable use guidelines to a supervising teacher (if student) or the technology coordinator. • You must report to a supervising teacher (if student) or the technology coordinator any requests for personally identifying information or contact from unknown individuals, as well as any content or communication that is abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. User’s Name (printed):

  • No Conflict, Breach, Violation or Default The execution, delivery and performance of the Transaction Documents by the Company and the issuance and sale of the Securities will not conflict with or result in a breach or violation of any of the terms and provisions of, or constitute a default under (i) the Company’s Articles of Incorporation or the Company’s Bylaws, both as in effect on the date hereof (true and complete copies of which have been made available to the Investor through the XXXXX system), or (ii)(a) any statute, rule, regulation or order of any governmental agency or body or any court, domestic or foreign, having jurisdiction over the Company, any Subsidiary or any of their respective assets or properties, or (b) any agreement or instrument to which the Company or any Subsidiary is a party or by which the Company or a Subsidiary is bound or to which any of their respective assets or properties is subject.

  • Authority and No Violation (a) Goldbelt has the necessary corporate power, authority and capacity to enter into this Agreement and to perform its obligations hereunder. The execution and delivery of this Agreement by Goldbelt, the issuance of the Subscription Shares and the consummation by Goldbelt of the Offer have been duly authorized by the Board of Directors and no other corporate proceedings on its part are necessary to authorize this Agreement, the issuance of the Subscription Shares or the Offer, other than with respect to the Directors’ Circular and other matters relating solely thereto. This Agreement has been duly executed and delivered by Goldbelt and constitutes a legal, valid and binding obligation of Goldbelt, enforceable against it in accordance with its terms, subject to bankruptcy, insolvency and other applicable Laws affecting creditors’ rights generally, and to general principles of equity. (b) The authorization of this Agreement, the execution and delivery by Goldbelt of this Agreement and the performance by it of its obligations under this Agreement, the issuance of the Subscription Shares and the consummation of the Offer, any Compulsory Acquisition and any Subsequent Acquisition Transaction will not: (i) result (with or without notice or the passage of time) in a violation or breach of or constitute a default under, require an Authorization to be obtained under or give rise to any third party right of termination, amendment, cancellation, acceleration, penalty or payment obligation or right of purchase or sale or pre-emptive or participation right under, any provision of: (A) its or any Goldbelt Subsidiary’s notice of articles, articles, declaration of constitution or other charter documents, the agreements among the shareholders of any Goldbelt Subsidiary or the agreements covering any of Goldbelt’s material joint ventures; (B) any applicable Laws, except to the extent that the violation or breach of, under, any applicable Laws, would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect in respect of Goldbelt; (C) any note, bond, mortgage, indenture, instrument, contract, agreement, lease, letter of intent, letter of offer, Authorization or government grant to which Goldbelt or any Goldbelt Subsidiary is party or by which it is bound, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect in respect of Goldbelt; or (D) any judgment, decree, order or award of any Governmental Entity or arbitrator; (ii) give rise to any right of termination, amendment, acceleration or cancellation of indebtedness of Goldbelt or any Goldbelt Subsidiary, or cause any such indebtedness to come due before its stated maturity, or cause any security interest in any assets of Goldbelt or any Goldbelt Subsidiary to become enforceable or realizable; (iii) give rise to any rights of first refusal or trigger any change in control provisions or any restriction or limitation under any such note, bond, mortgage, indenture, contract, agreement, Authorization or government grant, or result in the imposition of any encumbrance, charge or lien upon any of Goldbelt’s assets or the assets of any of the Goldbelt Subsidiaries, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect in respect of Goldbelt; or (iv) result in the imposition of any Encumbrance or Encumbrances upon any assets of Goldbelt or any Goldbelt Subsidiary, except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect in respect of Goldbelt.

  • Violation The Asset Representations Reviewer agrees that a violation of this Agreement may cause irreparable injury to the Issuer and the Servicer and the Issuer and the Servicer may seek injunctive relief in addition to legal remedies. If an action is initiated by the Issuer or the Servicer to enforce this Section 4.08, the prevailing party will be reimbursed for its fees and expenses, including reasonable attorney’s fees, incurred for the enforcement.

  • Authorization; No Violation Guarantor is authorized to execute, deliver and perform under this Guaranty, which is a valid, binding, and enforceable obligation of Guarantor in accordance with its terms, except as enforceability may be limited by bankruptcy, insolvency, reorganization, moratorium, or similar laws affecting creditor's rights generally. The execution, delivery and performance of this Guaranty are not in violation of any applicable law, regulation or ordinance, or any order or ruling of any court or governmental agency applicable to the Guarantor. The Guaranty does not conflict with, or constitute a breach or default under, any agreement to which Guarantor is a party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!