Timely Provision of Data Sample Clauses

Timely Provision of Data. Participant shall provide its Patient Data to MX regularly and promptly after receiving the Patient Data from Participant’s source(s). Participant shall maintain its connection to the System and facilitate access to the Patient Data as required by the Policies and Services Description. Data Quality. Participant shall use reasonable and appropriate efforts to ensure that all Healthcare Data provided by Participant and/or Personnel to MX is accurate with respect to each Patient. Each Party shall use reasonable and appropriate efforts to assure that its Personnel do not alter or corrupt the Patient Data received by or transmitted from that Party. Participant and its Authorized Users shall use reasonable professional judgment in its use of the Healthcare Data and its application of the Healthcare Data to make clinical decisions.
AutoNDA by SimpleDocs
Timely Provision of Data. Participant shall provide its Patient Data to MX regularly and promptly after receiving the Patient Data from Participant’s source(s). Participant shall maintain its connection to the System and facilitate access to the Patient Data as required by the Policies and Services Description.

Related to Timely Provision of Data

  • Provision of Data 26.1 The Supplier shall submit all information required under applicable law and regulations, such as but not limited to information required to meet financial and administrative obligations. If Wavin has not received one or more of the requested documents within ten (10) days of making the request, Wavin shall be entitled to suspend payment until the moment of receipt, or to terminate the Agreement without any liability. 26.2 Every change in the data submitted under clause 26.1 must be immediately reported to Wavin in writing.

  • Exclusion of Damages TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL EITHER PARTY BE LIABLE UNDER OR IN CONNECTION WITH THIS AGREEMENT OR ITS SUBJECT MATTER UNDER ANY LEGAL OR EQUITABLE THEORY, INCLUDING BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, AND OTHERWISE, INCLUDING FOR ANY: (a) LOSS OF PRODUCTION, USE, BUSINESS, REVENUE, OR PROFIT OR DIMINUTION IN VALUE; (b) IMPAIRMENT, INABILITY TO USE OR LOSS, INTERRUPTION OR DELAY OF THE SERVICES; (c) LOSS, DAMAGE, CORRUPTION OR RECOVERY OF DATA, OR BREACH OF DATA OR SYSTEM SECURITY; (d) COST OF REPLACEMENT GOODS OR SERVICES; (e) LOSS OF GOODWILL, LOSS OF BUSINESS OPPORTUNITY OR PROFIT, OR LOSS OF REPUTATION; OR (f) CONSEQUENTIAL, INCIDENTAL, INDIRECT, EXEMPLARY, SPECIAL, ENHANCED, OR PUNITIVE DAMAGES, REGARDLESS OF WHETHER SUCH PERSONS WERE ADVISED OF THE POSSIBILITY OF SUCH LOSSES OR DAMAGES OR SUCH LOSSES OR DAMAGES WERE OTHERWISE FORESEEABLE, AND NOTWITHSTANDING THE FAILURE OF ANY AGREED OR OTHER REMEDY OF ITS ESSENTIAL PURPOSE.

  • Calculation of Damages (a) The amount of any Damages payable under Section 9.02 by the Indemnifying Party shall be net of any amounts recovered or recoverable by the Indemnified Party under applicable insurance policies from any other third party with indemnification obligations or from any other Person alleged to be responsible therefor. If the Indemnified Party receives any amounts under applicable insurance policies, from any other third party with indemnification obligations or from any other Person alleged to be responsible for any Damages, subsequent to an indemnification payment by the Indemnifying Party, then such Indemnified Party shall promptly reimburse the Indemnifying Party for any payment made or expense incurred by such Indemnifying Party in connection with providing such indemnification payment up to the amount received by the Indemnified Party, net of any expenses incurred by such Indemnified Party in collecting such amount. (b) The Indemnifying Party shall not be liable under Section 9.02 for any (i) Damages relating to any matter to the extent that there is included in the Preliminary Balance Sheet a specific liability or reserve relating to such matter, (ii) consequential or punitive Damages or (iii) Damages for lost profits. (c) Notwithstanding any other provision of this Agreement to the contrary, if on the Closing Date the Indemnified Party has actual knowledge of any information that would cause one or more of the representations and warranties made by the Indemnifying Party to be inaccurate as of the date made, the Indemnified Party shall have no right or remedy after the Closing with respect to such inaccuracy and shall be deemed to have waived its rights to indemnification in respect thereof.

  • Limitation of Damages THE LIABILITY OF THE SELLER SHALL NOT EXTEND TO PERSONAL INJURY, PROPERTY DAMAGE, LOSS OF PROFIT, DELAY OR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING FROM THE FAILURE OF ANY SHEET TO CONFORM TO THE PROVISIONS OF THIS LIMITED WARRANTY. SHEFFIELD SHALL NOT IN ANY EVENT BE LIABLE FOR THE COST OF LABOR EXPENDED BY OTHERS ON ANY DEFECTIVE PANEL OR FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER WHETHER ARISING FROM BREACH OF CONTRACT, BREACH OF WARRANTY, TORT, INCLUDING NEGLIGENCE, STRICT LIABILITY OR OTHERWISE TO ANYONE BY REASON OF THE FACT THAT SUCH PANELS SHALL HAVE BEEN DEFECTIVE. THIS WARRANTY IS GIVEN AS THE EXCLUSIVE WARRANTY AND EXCLUSIVE REMEDY, AND NO OTHER WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR PURPOSES, ARE MADE, AND ANY SUCH OTHER WARRANTIES ARE EXPRESSLY DISCLAIMED. THERE ARE NO WARRANTIES, WHICH EXTEND BEYOND THE DESCRIPTION CONTAINED IN THIS INSTRUMENT. CUSTOMER WAIVES THE BENEFIT OF ANY RULE THAT THE DISCLAIMERS OF WARRANTY SHALL BE CONSTRUED AGAINST THE SELLER, AND AGREES THAT THE DISCLAIMERS IN THIS INSTRUMENT SHALL BE CONSTRUED LIBERALLY IN FAVOR OF SHEFFIELD. SHEFFIELD SHALL NOT BE LIABLE FOR ANY SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES. SHEFFIELD HEREBY DISCLAIMS ALL LIABILITIES FOR DAMAGES BASED ON THEORIES OF NEGLIGENCE AND STRICT PRODUCT LIABILITY.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Retention of Data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • SUNDRY PROVISIONS Section 4.1 Subject and subordinate always to the prior rights of the First Mortgagee under the First Mortgage and to the prior rights of the Second Mortgagee under the Second Mortgage, all of the covenants, promises, stipulations and agreements of the Shipowner in this Deed of Covenants contained shall bind the Shipowner and its successors and permitted assigns and shall be binding on and inure to the benefit of the Mortgagee and its successors and permitted assigns. In the event of any assignment of the Mortgage or this Deed of Covenants by the Mortgagee in accordance with the applicable provisions of the Third Lien Indenture, any other Third Lien Note Documents and the Third Lien Intercreditor Agreement, as applicable, the term “Mortgagee” as used in this Deed of Covenants shall be deemed to mean any such successor or permitted assignee. Section 4.2 Wherever and whenever herein any right, power or authority is granted or given to the Mortgagee, such right, power or authority may be exercised in all cases by the Mortgagee or such agent or agents as it may appoint, and the act or acts of such agent or agents when taken shall constitute the act of the Mortgagee hereunder. Section 4.3 (a) In the event that any provision of this Deed of Covenants shall be deemed invalid or unenforceable by reason of any present or future Legal Requirements or any decision of any court of competent jurisdiction, the validity and enforceability of any other provision hereof shall not be affected thereby. Any such invalidity or unenforceability of any provision of this Deed of Covenants in any jurisdiction or nation shall not render such provision invalid or unenforceable under the Legal Requirements of any other jurisdiction or nation.

  • Book-Entry Provisions This Section 2.1(b) shall apply only to a Global Security deposited with or on behalf of the Depository. The Company shall execute and the Trustee shall, in accordance with this Section 2.1(b), authenticate and deliver initially one or more Global Securities that (a) shall be registered in the name of the Depository for such Global Security or Global Securities or the nominee of such Depository and (b) shall be delivered by the Trustee to such Depository or pursuant to such Depository's instructions or held by the Trustee as custodian for the Depository. Members of, or participants in, the Depository ("Agent Members") shall have no rights under this Indenture with respect to any Global Security held on their behalf by the Depository or by the Trustee as the custodian of the Depository or under such Global Security, and the Company, the Trustee and any agent of the Company or the Trustee shall be entitled to treat the Depository as the absolute owner of such Global Security for all purposes whatsoever. Notwithstanding the foregoing, nothing herein shall prevent the Company, the Trustee or any agent of the Company or the Trustee from giving effect to any written certification, proxy or other authorization furnished by the Depository or impair, as between the Depository and its Agent Members, the operation of customary practices of such Depository governing the exercise of the rights of a holder of a beneficial interest in any Global Security.

  • Identification of Data a. All Background, Third Party Proprietary and Controlled Government Data provided by Disclosing Party shall be identified in the Annex under which it will be provided. b. NASA software and related Data provided to Partner shall be identified in the Annex under which it will be used. Notwithstanding H.4., Software and related Data will be provided to Partner under a separate Software Usage Agreement (SUA). Partner shall use and protect the related Data in accordance with this Article. Unless the SUA authorizes retention, or Partner enters into a license under 37 C.F.R. Part 404, the related Data shall be disposed of as instructed by NASA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!