Protocol Violations and Deviations Sample Clauses

Protocol Violations and Deviations. Notwithstanding the foregoing, PRINCIPAL INVESTIGATOR may, in accordance with applicable GCP Guidelines, deviate from the Protocols to protect a Study subject from an immediate hazard. Any such deviation will not constitute a failure to comply with the Protocols. INSTITUTION and/or PRINCIPAL INVESTIGATOR will notify SPONSOR and INSTITUTION’s Institutional Review Board (“IRB”) prompltly upon becoming aware of any such Protocol violation, and shall ensure that all such deviations from Protocols are properly recorded in the Study records. To the extent possible, INSTITUTION and PRINCIPAL INVESTIGATOR will use best efforts to quickly remedy violations and deviations and return to strict Protocol compliance.
AutoNDA by SimpleDocs

Related to Protocol Violations and Deviations

  • Repeat Violations Xxxxxxx agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.

  • Reporting Violations a) When appropriate, faculty members will submit timely written communication to their immediate supervisor any condition that comes to their attention that may, in their judgment, pose a threat to the health or safety of any person associated with the District.

  • Personnel Requirements and Documentation Grantee will;

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • DEVELOPMENTAL REQUIREMENTS The Personal Development Plan (PDP) for addressing developmental gaps is attached as Annexure B.

  • WAGE VIOLATIONS Contractor represents and warrants that, during the term of this Master Contract and the three (3) year period immediately preceding the award of the Master Contract, it is not determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW chapters 49.46, 49.48, or 49.52.

  • Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.

  • Adverse Events Subsequent to the date hereof, there shall not have occurred any of the following: (i) a suspension or material limitation in trading in securities generally on the New York Stock Exchange, the NASDAQ National Market or the NASDAQ Global Market, (ii) a general moratorium on commercial banking activities in the People’s Republic of China or New York, (iii) the outbreak or escalation of hostilities involving the United States or the People’s Republic of China or the declaration by the United States or the People’s Republic of China of a national emergency or war if the effect of any such event specified in this clause (iii) in your reasonable judgment makes it impracticable or inadvisable to proceed with the public offering or the delivery of the Shares on the terms and in the manner contemplated in the Prospectus, or (iv) such a material adverse change in general economic, political, financial or international conditions affecting financial markets in the United States or the People’s Republic of China having a material adverse impact on trading prices of securities in general, as, in your reasonable judgment, makes it impracticable or inadvisable to proceed with the public offering of the Shares or the delivery of the Shares on the terms and in the manner contemplated in the Prospectus.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data management incidents should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

Time is Money Join Law Insider Premium to draft better contracts faster.