Content in violation of Code of Conduct Sample Clauses

Content in violation of Code of Conduct. Users shall not use the Network to intentionally access, transmit, copy or create material that violates the rules stipulated in the Student-Parent Handbook.
AutoNDA by SimpleDocs

Related to Content in violation of Code of Conduct

  • SWEATFREE CODE OF CONDUCT a. All Contractors contracting for the procurement or laundering of apparel, garments or corresponding accessories, or the procurement of equipment, materials, or supplies, other than procurement related to a public works contract, declare under penalty of perjury that no apparel, garments or corresponding accessories, equipment, materials, or supplies furnished to the state pursuant to the contract have been laundered or produced in whole or in part by sweatshop labor, forced labor, convict labor, indentured labor under penal sanction, abusive forms of child labor or exploitation of children in sweatshop labor, or with the benefit of sweatshop labor, forced labor, convict labor, indentured labor under penal sanction, abusive forms of child labor or exploitation of children in sweatshop labor. The contractor further declares under penalty of perjury that they adhere to the Sweatfree Code of Conduct as set forth on the California Department of Industrial Relations website located at xxx.xxx.xx.xxx, and Public Contract Code Section 6108.

  • Code of Conduct The rules, procedures and restrictions concerning the conduct of ISO Directors and employees contained in Attachment F to the ISO Open Access Transmission Tariff.

  • Supplier Code of Conduct At all times during the term of this Agreement, Seller will comply with the Apple Supplier Code of Conduct ("Code of Conduct"), as amended by Apple from time-to-time, available from Apple’s public website at xxxxx://xxx.xxxxx.xxx/supplier-responsibility/. Notwithstanding anything to the contrary herein, Seller will: (i) allow Apple and a third party representative, retained by or representing Apple (collectively, the "Auditor"), to assess Seller’s compliance with the Code of Conduct by inspecting Seller’s facilities and/or reviewing Seller’s practices, policies, and relevant records without notice, and/or by interviewing Seller’s personnel without monitoring, solely to verify Seller’s compliance with the Code of Conduct (collectively, an "Assessment"); (ii) promptly provide the Auditor with access to any relevant facilities and personnel without disruption or interference, in connection with any Assessment; (iii) promptly provide complete and accurate information and documentation in response to the Auditor’s requests, (iv) allow the Auditor to review and assess working hours and conditions, remuneration and benefits, personnel practices, production, dormitory, and dining facilities, business conduct, and health, safety, and environmental practices, as applicable, in connection with any Assessment; (v) not request or encourage, directly or indirectly, any Seller personnel to furnish false or incomplete information in connection with any Assessment; (vi) not take retaliatory action against any Seller personnel interviewed during an Assessment; and

  • VIOLATION OF RULES If any rule or provision of this Pet Agreement is violated by Residents or Residents’ guests or occupants in the sole judgment of Management, Residents shall immediately (within forty eight (48) hrs) and permanently remove the pet from the premises upon written notice from Owner or Owner’s representative; and Owner shall have all other rights and remedies set forth in the Lease, including damages, eviction and/or attorney’s fees.

  • Registry Code of Conduct In connection with the operation of the registry for the TLD, Registry Operator shall comply with the Registry Code of Conduct as set forth in Specification 9 attached hereto (“Specification 9”).

  • ALLEGED VIOLATIONS ‌ At its discretion, NRMP will investigate alleged violations of this Agreement, including but not limited to:

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data management incidents should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Independence from Material Breach Determination Except as set forth in Section X.D.1.c, these provisions for payment of Stipulated Penalties shall not affect or otherwise set a standard for OIG’s decision that CHSI has materially breached this CIA, which decision shall be made at OIG’s discretion and shall be governed by the provisions in Section X.D, below.

  • Repeat Violations Xxxxxxx agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.

  • REGISTRY OPERATOR CODE OF CONDUCT 1. In connection with the operation of the registry for the TLD, Registry Operator will not, and will not allow any parent, subsidiary, Affiliate, subcontractor or other related entity, to the extent such party is engaged in the provision of Registry Services with respect to the TLD (each, a “Registry Related Party”), to:

Time is Money Join Law Insider Premium to draft better contracts faster.