Theft, Fire and Break Sample Clauses

Theft, Fire and Break. In: Any damage/loss resultant from theft, fire of Break-in. Wicked Campers does not offer compensation for loss of any personal items.
AutoNDA by SimpleDocs

Related to Theft, Fire and Break

  • Termination and Breach 13.1 The termination of this Agreement or any part thereof however caused and the serving of notice to terminate shall be without prejudice to any obligations or rights of any of the parties which have accrued prior to such termination and shall not affect any provision of this Agreement which is expressly or by implication provided to come into effect on or to continue in effect after such termination

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Lunch Break Each Teacher shall receive each day an uninterrupted and continuous period of not less than forty (40) minutes for lunch, free from supervisory, teaching or other assigned duties (reference: Regulation 298.s. 3, Daily Sessions).

  • Data Breaches A. Upon the discovery by the Contractor of a confirmed breach of security that results in the unauthorized release, disclosure, or acquisition of student data, the Contractor shall provide initial notice to the Board as soon as reasonably possible, after such discovery (“Initial Notice”). The Initial Notice shall be delivered to the Board by electronic mail to Superintendent Xxxxxxx X. Xxxx, xxxxx@xxxxxxxxxxxx.xxx or to the contact currently on file and shall include the following information, to the extent known at the time of notification:

  • Complete Destruction In the event the Premises are completely destroyed by fire, explosion, the elements, a public enemy, Act of God, or other casualty or are so damaged as to render the entire Premises untenable, and the Premises cannot be repaired within 120 days, Company will give Authority immediate notice thereof, and Authority will be under no obligation to repair, replace, and reconstruct said Premises. In the event Authority elects not to repair, replace, and reconstruct said Premises, Authority will not be required to grant alternative premises and this Agreement and the obligations of the Parties hereunder will terminate.

  • Demotion and Layoff 10:1 In the event reduction of forces or curtailment of operation shall occur, employees shall be laid off in the reverse order of their Company seniority in the area in which they are working at the time of the reduction. The application of this Section to an employee working temporarily in an area shall apply only to the extent that it affects him/her in his/her regular area.

  • Employee Orientation Each and every person working for a contractor, including sub- contractors, will be given an orientation to familiarize them with the site safety program. Unless otherwise specified, each sub-contractor is responsible for the orientation of their workers.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”).

  • Lunch Breaks The lunch break will consist of a one-half hour (or one hour where scheduled) unpaid break taken mid-way during regular work day. In the event that an employee is required to work during his regular lunch period he shall be allowed a one-half hour lunch period between the hours of ll:30 a.m. and l:00 p.m., otherwise he shall be paid double time for working through said lunch period.

Time is Money Join Law Insider Premium to draft better contracts faster.