Technical Breach definition

Technical Breach has the meaning given in the Works Coordination Agreement.
Technical Breach. – means minor contravention of a House Rule that was unintended.

Examples of Technical Breach in a sentence

  • The parties agree to use reasonable endeavours to exchange relevant information to facilitate the remedy of any Technical Breach.

  • The management of the Company has commenced discussion with the lender for a waiver of the Technical Breach.

  • A list of these receptors can be found in the Appendix A at the end of this document.3.2.1 Descriptions of Technical Breach Areas The technical breach areas can be described as follows: • Gillygate is located to the north of the city centre close to where the busy A19 arterial route meets the inner ring road.

  • Powerlink is not obliged to reconnect the Powerlink Assets and the Negotiated Assets (as applicable) or the Generator Facility where it has refused to connect or has disconnected under this clause 8 (“Disconnection or refusal to connect”) unless the Generator has remedied the Technical Breach or taken steps to avoid the recurrence of the threat to the Powerlink Assets and the Negotiated Assets (as applicable) or Power System Security to Powerlink’s reasonable satisfaction.

  • The basis for the preparation of the condensed consolidated financial statements of the Group is, therefore, dependent upon the written consent to waive Technical Breach by the relevant bank (“Consent”) being obtained, the operations of the Group to generate sufficient cash flows in the future to fulfill its obligations as and when they fall due and the continuing financial support from its lenders.

  • This Agreement and the documents referred to herein contain the entire agreement among CCG and Canterbury with respect to the transactions contemplated hereunder and this Agreement supersedes all prior arrangements or understandings with respect thereto, whether written or oral.

  • Brassell, her sister, Earline Wolfe Greynolds, became the beneficiary of the Maxine Trust.

  • In light of this, the Commission has decided to grant Power and Water a further 12 months to address these non-compliance matters, including in order to update associated procedural and training documentation and to put in place the written related-party terms and conditions required under the Code possibly in lieu of Service Level Agreements (SLAs).Accordingly, the Technical Breach notice has been withdrawn.

  • Investment Breach Technical Breach ร น าร ร าร าร 9 น ย v าร 9 น ํา ร 9 น Pre-Funding≥60 : <40 g าย.

  • This means that, at least in the short term, the government will need to set bound- aries on the level of price changes.

Related to Technical Breach

  • Willful and Material Breach means a material breach that is a consequence of an act undertaken by the breaching party or the failure by the breaching party to take an act it is required to take under this Agreement, with knowledge that the taking of or failure to take such act would, or would reasonably be expected to, result in, constitute or cause a breach of this Agreement.

  • Material Breach means a breach by either Party of any of its obligations under this Agreement which has or is likely to have a Material Adverse Effect on the Project and which such Party shall have failed to cure.

  • Data Breach means the unauthorized access by an unauthorized person that results in the use, disclosure or theft of Customer Data.

  • Intentional Breach means, with respect to any representation, warranty, agreement or covenant, an action or omission taken or omitted to be taken that the breaching party intentionally takes (or intentionally fails to take) and knows (or reasonably should have known) would, or would reasonably be expected to, cause a material breach of such representation, warranty, agreement or covenant.

  • Substantial Breach means a breach of any of clauses 3.8, 3.9, 4.1, 4.2, 5.1(c)(i) to 5.1(c)(xxiv) (inclusive), 17.1, 17.2, 31.2 or 31.7(c) of this Agreement;

  • Data Breaches Party shall report to AHS, though its Chief Information Officer (CIO), any impermissible use or disclosure that compromises the security, confidentiality or privacy of any form of protected personal information identified above within 24 hours of the discovery of the breach. Party shall in addition comply with any other data breach notification requirements required under federal or state law.

  • Breach means an impermissible use or disclosure of electronic or non-electronic sensitive personal information by an unauthorized person or for an unauthorized purpose that compromises the security or privacy of Confidential Information such that the use or disclosure poses a risk of reputational harm, theft of financial information, identity theft, or medical identity theft. Any acquisition, access, use, disclosure or loss of Confidential Information other than as permitted by this DUA shall be presumed to be a Breach

  • Persistent Breach means a Default which has occurred on three or more separate occasions with a continuous period of six (6) months.

  • Serious Breach means any breach defined as a Serious Breach in the Agreement or any breach or breaches which adversely, materially or substantially affect the performance or delivery of the Services or compliance with the terms and conditions of the Agreement or the provision of a safe, healthy and supportive learning environment or a breach of security that adversely affects the Personal Data or privacy of an individual. Failure to comply with Law, or actions or omissions by the Provider that endanger the Health or Safety of Learners, Provider Personnel, and all other persons including members of the public would constitute a Serious Breach;

  • Non-Breaching Party has the meaning set forth in Section 9.3.

  • Willful Breach means a material breach that is a consequence of an act undertaken or a failure to act by the breaching party with the knowledge that the taking of such act or such failure to act would, or would reasonably be expected to, constitute or result in a breach of this Agreement.

  • Privacy Breach means a common law breach of confidence, infringement, or violation of any rights to privacy, including but not limited to breach of “Your” privacy statement, breach of a person’s right of publicity, wrongful collection, false light, intrusion upon a person’s seclusion, public disclosure of “Private Information”, or misappropriation of a person’s picture or name for commercial gain.

  • Research misconduct means fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results. Research misconduct does not include honest error or differences of opinion. As used in this definition, (i) “fabrication” means making up data or results and recording or reporting them; (ii) “falsification” means manipulating research materials, equipment, or processes, or changing or omitting data or results such that the research is not accurately represented in the research record; and (iii) “plagiarism” means the appropriation of another person’s ideas, processes, results, or words without giving appropriate credit.

  • Breaching Party has the meaning set forth in Section 12.2.

  • Security Breach means (i) any act or omission that materially compromises either the security, confidentiality or integrity of Named Entity Protected Data, or the physical, technical, administrative or organizational safeguards put in place by Vendor or any Authorized Persons that relate to the protection of the security, confidentiality or integrity of Named Entity Protected Data, (ii) receipt of a complaint in relation to the privacy practices of Vendor or any Authorized Persons or a breach or alleged breach of this Contract relating to such privacy practices.

  • Root Cause Analysis means a method of problem solving designed to identify the underlying causes of a problem. The focus of a root cause analysis is on systems, processes, and outcomes that require change to reduce the risk of harm.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Statement of Work means the description of activities performed in completing the Project, as specified in the Contract and as may be amended.

  • Breach of Agreement provisions of Section 5(a)(ii) will apply to Party A and will not apply to Party B.

  • Technical Support Services means the technical support and maintenance Services provided by us according to our then-current technical support policy and procedure listed at xxxxxxxxxxxxx.xxx (“Technical Support Policy”) when the Services are purchased.

  • Confidentiality Undertaking means a confidentiality undertaking substantially in a recommended form of the LMA or in any other form agreed between the Borrower and the Agent.

  • Scope of Works means the sections of the RFQ detailing the technical requirements of the work to be carried out as existing at the Date of Acceptance of the Quotation and any modification of such Works thereafter directed or the use of which has been permitted by the Superintendent for the purposes of the Contract.

  • Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Providing Party has the meaning set forth in Section 11.

  • Standard of performance means a standard for emission of air pollutants which reflects the degree of emission limitation achievable through the application of the best system of emission reduction which (taking into account the cost of achieving such reduction) the Director determines has been adequately demonstrated.