Detention and Demurrage Sample Clauses

Detention and Demurrage. Contractor shall not be liable for demurrage, detention, or delays in unloading inbound vehicles, or detention or delays in obtaining and loading vehicles for outbound shipment unless Contractor has failed to exercise reasonable care and judgment as determined by industry practice.
AutoNDA by SimpleDocs
Detention and Demurrage. Company shall be responsible for all detention and demurrage charges incurred in connection with storing or handling Inventory. Company shall keep records concerning detention of vehicles to assist Microsoft and Company in processing any objection to a carrier’s imposition of detention charges.
Detention and Demurrage. Warehouse shall be responsible for all unloading charges for truck detention and railroad demurrage which are charged or claimed to be due to carriers in connection with the handling of Storer's Products when such charges are occasioned by Warehouse'x xxxxx in providing the warehousing services required within the applicable, 2 hour free time window for loading or unloading allowed by such carriers, provided that Storer shall have given Warehouseman advance notice of such deliverxxx.
Detention and Demurrage. For railcars, Buyer will be allowed *** for unloading from actual placement of railcar, Buyer agreeing to pay demurrage charges of $*** for any day thereafter. For trucks, Buyer will be allowed *** for unloading, Buyer agreeing to pay $*** per hour thereafter for any truck detention. Any demurrage billed to Buyer shall have appropriate documentation substantiating the demurrage.

Related to Detention and Demurrage

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

  • Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Due Care THE EXECUTIVE ACKNOWLEDGES THAT HE HAS RECEIVED A COPY OF THIS RELEASE PRIOR TO ITS EXECUTION AND HAS BEEN ADVISED HEREBY OF HIS OPPORTUNITY TO REVIEW AND CONSIDER THIS RELEASE FOR TWENTY-ONE (21) DAYS PRIOR TO ITS EXECUTION. THE EXECUTIVE FURTHER ACKNOWLEDGES THAT HE HAS BEEN ADVISED HEREBY TO CONSULT WITH AN ATTORNEY PRIOR TO EXECUTING THIS RELEASE. THE EXECUTIVE ENTERS INTO THIS RELEASE HAVING FREELY AND KNOWINGLY ELECTED, AFTER DUE CONSIDERATION, TO EXECUTE THIS RELEASE AND TO FULFILL THE PROMISES SET FORTH HEREIN. THIS RELEASE SHALL BE REVOCABLE BY THE EXECUTIVE DURING THE SEVEN (7) DAY PERIOD FOLLOWING ITS EXECUTION, AND SHALL NOT BECOME EFFECTIVE OR ENFORCEABLE UNTIL THE EXPIRATION OF SUCH SEVEN (7) DAY PERIOD. IN THE EVENT OF SUCH A REVOCATION, THE EXECUTIVE SHALL NOT BE ENTITLED TO THE CONSIDERATION FOR THIS RELEASE SET FORTH ABOVE.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Prevention of and release from arrest Each Borrower shall promptly discharge:

  • Arrest Any Vessel or Vessels shall be arrested and the same shall continue unremedied for at least 20 days, unless such arrest would not have a Material Adverse Effect.

  • Enforcement and Remedies Executive acknowledges that money damages would not be sufficient remedy for any breach of this Article 6 by Executive, and Company shall be entitled to enforce the provisions of this Article 6 by terminating any payments then owing to Executive under this Agreement and/or to specific performance and injunctive relief as remedies for such breach or any threatened breach. Such remedies shall not be deemed the exclusive remedies for a breach of this Article 6, but shall be in addition to all remedies available at law or in equity to Company, including, without limitation, the recovery of damages from Executive and Executive’s agents involved in such breach and remedies available to Company pursuant to other agreements with Executive.

  • LIMIT AND RETENTION A. Under this Exhibit the Subscribing Reinsurer shall be liable for the Ultimate Net Loss in excess of $200,000,000 each Loss Occurrence (regardless of the number of policies under which such loss is payable or the number of different interests insured) subject to a limit of $100,000,000 each Loss Occurrence. The maximum contribution to the Ultimate Net Loss shall be limited to a maximum per life recovery of $10,000,000 (discounted to net present value in accordance with the provisions of the Commutation Article).

Time is Money Join Law Insider Premium to draft better contracts faster.