Source of Vulnerability Sample Clauses

Source of Vulnerability. In the first place, it is necessary to investigate the source of the vulnerability of specific groups of individuals.265 The information asymmetries prevail mainly in contract law. The protections rules presume that the specific individuals obtain partial or even no information. Such parties might be typical consumers who suffer information disadvantage while concluding the contract. On the opposite side stands the stronger party (in this case the strength represents only “informational strength”) that conclude the contracts daily, such as insurers, etc., that utilize financial resources in order to be informed of legal consequences of applying a specific law or using specific court and might misuse these information for their benefit. The economic or social reliance may be identified as the second reason for the vulnerability of weaker parties. This group may include employees or maintenance creditors. The dependence 261 X. XXXX, Nordic Court Culture in Progress: Historical and Futuristic Perspectives, op. cit., p. 396-399. 262 X. XXXX, The Protection of Weaker Parties in the Private International Law of the European Union: A Portrait of Inconsistency and Conceptual Truancy, Journal of Private International Law 10: 3 (2014), p. 342. 263 On the imbalances of the powers in family and succession matters: X. XXXX, The Protection of Weaker Parties in the Private International Law of the European Union: A Portrait of Inconsistency and Conceptual Truancy, op. cit. p. 335–58; X. XXXXXXXXXX, Party autonomy in the legal regulation of adult relationships: what place for party choice in Private International Law?, op. cit., pp. 881-913. 264 See supra Chapter One, Subchapter III, Section 2.1.1. 265 See division in X. XXXX, The Protection of Weaker Parties in the Private International Law of the European Union: A Portrait of Inconsistency and Conceptual Truancy, op. cit., p. 342-346. of the employee on the income from the employers is evident.266 The employer pays a salary to the employees and the employees benefit the business of employer by the performance of their duties according to the employment agreement. The maintenance creditors are dependent on the income from the maintenance debtor, but compared with the position of employees, the maintenance creditor does not provide for any performance for the maintenance debtor in order to benefit him. Therefore, the maintenance creditor must often rely on the voluntary fulfilment of the maintenance debtor. In the last gr...
AutoNDA by SimpleDocs

Related to Source of Vulnerability

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Freedom to Use Ideas Subject to Section 9 and Client’s rights in Client Information and notwithstanding anything to the contrary contained in this Agreement or an Order Form, the ideas, methods, concepts, know-how, structures, techniques, inventions, developments, processes, discoveries, improvements and other information and materials developed in and during the course of any Order Form may be used by Red Hat, without an obligation to account, in any way Red Hat deems appropriate, including by or for itself or its clients or customers.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section.

  • Grievability Denial of a petition for reinstatement is grievable. The grievance may not be based on information other than that shared with the Employer at the time of the petition for reinstatement.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Non-Grievability No dispute over a claim for any benefits extended by this Health and Welfare Fund shall be subject to the grievance procedure.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

Time is Money Join Law Insider Premium to draft better contracts faster.