Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article
Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.
Repeat Violations Xxxxxxx agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.
Actions in Event of Breach Upon Contractor’s material breach, the Department may: terminate this contract under Section 17.1 and pursue any of its remedies under this contract, at law, or in equity; or treat this contract as materially breached and pursue any of its remedies under this contract, at law, or in equity. Upon the Department’s material breach, Contractor may: terminate this contract under Section 17.2 and pursue any of its remedies under this contract, at law, or in equity; or treat this contract as materially breached and, except as the remedy is limited in this contract, pursue any of its remedies under this contract, at law, or in equity.
Independence from Material Breach Determination Except as set forth in Section X.D.1.c, these provisions for payment of Stipulated Penalties shall not affect or otherwise set a standard for OIG’s decision that Xxxxx has materially breached this IA, which decision shall be made at OIG’s discretion and shall be governed by the provisions in Section X.D, below.
Tea Breaks (a) Every employee will be entitled to a paid 10 minute tea break in each four hours worked at a time to be agreed between the employee and employer. (b) Subject to agreement between the employer and employee, such breaks may alternatively be taken as one 20 minute tea break. (c) Xxx breaks will count as time worked.
Material Breach A material breach for purposes of this Agreement shall include, but not be limited to: (a) Failure to timely furnish the documents described in Section 6 or the information requested by GO-Biz or the FTB relating to Taxpayer’s compliance with this Agreement. (b) Material misstatements in any information provided to GO-Biz as part of the application process and/or after this Agreement is signed. (c) Failure to materially satisfy applicable Milestones as set forth in Exhibit A, materiality of which shall be determined by GO-Biz, by the end of the last taxable year identified in Exhibit A. (d) Failure to maintain one or more Milestones for a minimum of three (3) subsequent taxable years after achieving the Milestone(s).
Event of Breach 7.1 The following circumstances shall be deemed Event of Default: 7.1.1 Pledgor’s any breach to any obligations under the Transaction Documents and/or this Agreement. 7.1.2 Party C’s any breach to any obligations under the Transaction Documents and/or this Agreement. 7.2 Upon notice or discovery of the occurrence of any circumstances or event that may lead to the aforementioned circumstances described in Section 7.1, Pledgor and Party C shall immediately notify Pledgee in writing accordingly. 7.3 Unless an Event of Default set forth in this Section 7.1 has been successfully resolved to Pledgee’s satisfaction within twenty (20) days after the Pledgee and /or Party C delivers a notice to the Pledgor requesting ratification of such Event of Default, Pledgee may issue a Notice of Default to Pledgor in writing at any time thereafter, demanding the Pledgor to immediately exercise the Pledge in accordance with the provisions of Section 8 of this Agreement.
No Conflict, Breach, Violation or Default The execution, delivery and performance of the Transaction Documents by the Company and the issuance and sale of the Securities will not conflict with or result in a breach or violation of any of the terms and provisions of, or constitute a default under (i) the Company’s Articles of Incorporation or the Company’s Bylaws, both as in effect on the date hereof (true and complete copies of which have been made available to the Investor through the XXXXX system), or (ii)(a) any statute, rule, regulation or order of any governmental agency or body or any court, domestic or foreign, having jurisdiction over the Company, any Subsidiary or any of their respective assets or properties, or (b) any agreement or instrument to which the Company or any Subsidiary is a party or by which the Company or a Subsidiary is bound or to which any of their respective assets or properties is subject.
Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”). 5.7.2 The Data Processor shall make reasonable efforts to identify the cause of such a breach and take those steps as they deem necessary to establish the cause, and to prevent such a breach from reoccurring.