THEFT BY DECEPTION (CHEATING Sample Clauses

THEFT BY DECEPTION (CHEATING. The Company shall not be liable for any loss or damage caused by or attributed to the act of cheating by any person within the meaning of the definition of the offence of cheating set out in the Penal Code. Cheating as defined in the Penal Code is as follows:- "Whoever, by deceiving any person, fraudulently or dishonestly induces the person so deceived to deliver any property or intentionally induces the person so deceived to do or omit to do anything which he would not do or omit if he were not so deceived, and which act or omission causes or is likely to cause damage or harm to that person in body, mind, reputation or property, is said to 'cheat'."
AutoNDA by SimpleDocs

Related to THEFT BY DECEPTION (CHEATING

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION You agree to notify Credit Union immediately, orally or in writing at Florida Credit Union, X.X. Xxx 0000, Xxxxxxxxxxx, XX 00000 or telephone (000) 000-0000 twenty four

  • TERMINATION BY MPS - BREACH BY CONTRACTOR If Contractor fails to fulfill its obligations under this Contract in a timely or proper manner, or violates any of its provisions, MPS shall thereupon have the right to terminate it by giving five (5) days written notice before the effective date of termination of the Contract, specifying the alleged violations, and effective date of termination. The Contract shall not be terminated if, upon receipt of the notice, Contractor promptly cures the alleged violation with five (5) days. In the event of termination, MPS will only be liable for services rendered through the date of termination and not for the uncompleted portion, or for any materials or services purchased or paid for by Contractor for use in completing the Contract.

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • USE OF CONTRACT BY OTHER GOVERNMENT AGENCIES At the option of the Contractor, the use of the contract resulting from this solicitation may be extended to other governmental agencies, including the State of Florida, its agencies, political subdivisions, counties, and cities. Each governmental agency allowed by the Contractor to use this contract shall do so independent of any other governmental entity. Each agency shall be responsible for its own purchases and shall be liable only for goods or services ordered, received and accepted. No agency receives any liability by virtue of this bid and subsequent contract award.

  • DAMAGES, DESTRUCTION AND EMINENT DOMAIN (a) If, prior to closing, the Property or any part thereof be destroyed or further damaged by fire, the elements, or any cause, due to events occurring subsequent to the date of this Agreement to the extent that the cost of repair exceeds $10,000.00, this Agreement shall become null and void, at Buyer's option exercised, if at all, by written notice to Seller within ten (10) days after Buyer has received written notice from Seller of said destruction or damage. Seller, however, shall have the right to adjust or settle any insured loss until (i) all contingencies set forth in Paragraph 6 hereof have been satisfied, or waived; and (ii) any ten-day period provided for above in this Subparagraph 16a for Buyer to elect to terminate this Agreement has expired or Buyer has, by written notice to Seller, waived Buyer's right to terminate this Agreement. If Buyer elects to proceed and to consummate the purchase despite said damage or destruction, there shall be no reduction in or abatement of the purchase price, and Seller shall assign to Buyer the Seller's right, title, and interest in and to all insurance proceeds (pro-rata in relation to the Entire Property) resulting from said damage or destruction to the extent that the same are payable with respect to damage to the Property, subject to rights of any Tenant of the Entire Property. If the cost of repair is less than $10,000.00, Buyer shall be obligated to otherwise perform hereinunder with no adjustment to the Purchase Price, reduction or abatement, and Seller shall assign Seller's right, title and interest in and to all insurance proceeds pro-rata in relation to the Entire Property, subject to rights of any Tenant of the Entire Property. (b) If, prior to closing, the Property, or any part thereof, is taken by eminent domain, this Agreement shall become null and void, at Buyer's option. If Buyer elects to proceed and to consummate the purchase despite said taking, there shall be no reduction in, or abatement of, the purchase price, and Seller shall assign to Buyer the Seller's right, title, and interest in and to any award made, or to be made, in the condemnation proceeding pro-rata in relation to the Entire Property, subject to rights of any Tenant of the Entire Property. In the event that this Agreement is terminated by Buyer as provided above in Subparagraph 16a or 16b, the First Payment shall be immediately returned to Buyer (after execution by Buyer of such documents reasonably requested by Seller to evidence the termination hereof).

  • BREACH DISCOVERY AND NOTIFICATION 17 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 18 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 19 law enforcement official pursuant to 45 CFR § 164.412. 20 a. A Breach shall be treated as discovered by CONTRACTOR as of the first day on which 21 such Breach is known to CONTRACTOR or, by exercising reasonable diligence, would have been 22 known to CONTRACTOR. 23 b. CONTRACTOR shall be deemed to have knowledge of a Breach, if the Breach is 24 known, or by exercising reasonable diligence would have known, to any person who is an employee, 25 officer, or other agent of CONTRACTOR, as determined by federal common law of agency. 26 2. CONTRACTOR shall provide the notification of the Breach immediately to the COUNTY 27 Privacy Officer. CONTRACTOR’s notification may be oral, but shall be followed by written 28 notification within twenty four (24) hours of the oral notification. 29 3. CONTRACTOR’s notification shall include, to the extent possible: 30 a. The identification of each Individual whose Unsecured PHI has been, or is reasonably 31 believed by CONTRACTOR to have been, accessed, acquired, used, or disclosed during the Breach; 32 b. Any other information that COUNTY is required to include in the notification to 33 Individual under 45 CFR §164.404 (c) at the time CONTRACTOR is required to notify COUNTY or 34 promptly thereafter as this information becomes available, even after the regulatory sixty (60) day 35 period set forth in 45 CFR § 164.410 (b) has elapsed, including: 36 1) A brief description of what happened, including the date of the Breach and the date 37 of the discovery of the Breach, if known; 1 2) A description of the types of Unsecured PHI that were involved in the Breach (such 2 as whether full name, social security number, date of birth, home address, account number, diagnosis, 3 disability code, or other types of information were involved); 4 3) Any steps Individuals should take to protect themselves from potential harm 5 resulting from the Breach; 6 4) A brief description of what CONTRACTOR is doing to investigate the Breach, to 7 mitigate harm to Individuals, and to protect against any future Breaches; and 8 5) Contact procedures for Individuals to ask questions or learn additional information, 9 which shall include a toll-free telephone number, an e-mail address, Web site, or postal address. 10 4. COUNTY may require CONTRACTOR to provide notice to the Individual as required in 11 45 CFR § 164.404, if it is reasonable to do so under the circumstances, at the sole discretion of the 12 COUNTY. 13 5. In the event that CONTRACTOR is responsible for a Breach of Unsecured PHI in violation 14 of the HIPAA Privacy Rule, CONTRACTOR shall have the burden of demonstrating that 15 CONTRACTOR made all notifications to COUNTY consistent with this Subparagraph F and as 16 required by the Breach notification regulations, or, in the alternative, that the acquisition, access, use, or 17 disclosure of PHI did not constitute a Breach. 18 6. CONTRACTOR shall maintain documentation of all required notifications of a Breach or 19 its risk assessment under 45 CFR § 164.402 to demonstrate that a Breach did not occur. 20 7. CONTRACTOR shall provide to COUNTY all specific and pertinent information about the 21 Breach, including the information listed in Section E.3.b.(1)-(5) above, if not yet provided, to permit 22 COUNTY to meet its notification obligations under Subpart D of 45 CFR Part 164 as soon as 23 practicable, but in no event later than fifteen (15) calendar days after CONTRACTOR’s initial report of 24 the Breach to COUNTY pursuant to Subparagraph F.2. above. 25 8. CONTRACTOR shall continue to provide all additional pertinent information about the

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Prohibition on Use of Public Funds for Political Activity In performing the Services, Contractor shall comply with San Francisco Administrative Code Chapter 12G, which prohibits funds appropriated by the City for this Agreement from being expended to participate in, support, or attempt to influence any political campaign for a candidate or for a ballot measure. Contractor is subject to the enforcement and penalty provisions in Chapter 12G.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!