Tea Breaks (a) Every employee will be entitled to a paid 10 minute tea break in each four hours worked at a time to be agreed between the employee and employer. (b) Subject to agreement between the employer and employee, such breaks may alternatively be taken as one 20 minute tea break. (c) Xxx breaks will count as time worked.
Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article
Coffee Breaks The Company will provide two (2) fifteen (15) minute coffee breaks during each work day, one in the morning and one in the afternoon.
Prior Disaster Relief Contract Violation Under Sections 2155.006 and 2261.053 of the Texas Government Code (relating to convictions and penalties regarding Hurricane Xxxx, Hurricane Xxxxxxx, and other disasters), the Contractor certifies that the individual or business entity named in this Contract and any related Solicitation Response is not ineligible to receive this Contract and acknowledges that this Contract may be terminated and payment withheld if this certification is inaccurate.
H3 Break The Authority shall have the right to terminate the Contract at any time by giving three (3) Months’ written notice to the Contractor. The Authority may extend the period of notice at any time before it expires, subject to agreement on the level of Services to be provided by the Contractor during the period of extension.
Independence from Material Breach Determination Except as set forth in Section X.D.1.c, these provisions for payment of Stipulated Penalties shall not affect or otherwise set a standard for OIG’s decision that Xxxxx has materially breached this IA, which decision shall be made at OIG’s discretion and shall be governed by the provisions in Section X.D, below.
Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.
Repeat Violations Xxxxxxx agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.
Our Liability for Failure to Complete Transactions If we do not properly complete a transaction from your Card on time or in the correct amount according to our Agreement with you, we will be liable for your losses or damages. However, there are some exceptions. We will not be liable, for instance:
Cost of remedying Defects Any repair or rectification undertaken in accordance with the provisions of Clause 17.2, including any additional testing, shall be carried out by the Contractor at its own risk and cost, to the extent that such rectification or repair is attributable to: (a) the design of the Project; (b) Plant, Materials or workmanship not being in accordance with this Agreement and the Specifications and Standards; (c) improper maintenance during construction of the Project Highway by the Contractor; and/ or (d) failure by the Contractor to comply with any other obligation under this Agreement.