THE VIOLATIONS Sample Clauses

THE VIOLATIONS. This case involves the unlicensed and unlawful export to China of multiple versions of HSC software to test and operate an Electronic Engine Control (“EEC”) system for certain PWC helicopter engines, which were ultimately used in Chinese Z10 military attack helicopter prototypes. The conduct involved three violations of law. The first were export violations by PWC in connection with exports of a defense article, specifically, the software to test and operate the EEC system for 10 PWC helicopter engines that were used in a Chinese Medium Helicopter (“CMH”) development program. The exports were made in violation of the Arms Export Control Act (“AECA”), 22 U.S.C. § 2778(b)(2) and (c); the International Traffic in Arms Regulations (“ITAR”), 22 C.F.R. §§ 127.1 and 127.3; and the causing provisions of 18 U.S.C. §2(b). Three Z10 prototypes were built using PWC engines that contained HSC EEC software that had been specifically modified in the United States for use in the military helicopter application. Even though the engines themselves and the accompanying EEC hardware were dual-use items that could be lawfully exported to China, the EEC software was modified for the Z10 aircraft application and thereby became subject to the ITAR. As a result, the exports required a license from the Department of State, which was never sought and, if sought, would have been denied. The second violation was the making of false statements by UTC, PWC and HSC in two disclosure letters to the Department of State, in violation of 18 U.S.C. § 1001(a)(2). In the letters, UTC, PWC and HSC falsely stated that PWC understood from the inception of the program that civil and military variants of the CMH would be developed concurrently and in parallel from a common “platform” engine, transmission and rotor, when in fact employees in PWC’s marketing and export departments were aware from the start of the program that the Chinese were first developing a military version of CMH, with the civil version to follow at some future time. By the time the disclosures were submitted to the State Department, employees of HSC and a UTC division who were working on the disclosures had become aware that the statements concerning PWC’s understanding at the inception of the program were not accurate. The third violation was the failure of PWC and HSC to timely report to the United States Department of State’s Directorate of Defense Trade Controls (“DDTC”), as required by the ITAR, that a defense article (the ...
AutoNDA by SimpleDocs

Related to THE VIOLATIONS

  • WAGE VIOLATIONS Contractor represents and warrants that, during the term of this Master Contract and the three (3) year period immediately preceding the award of the Master Contract, it is not determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW chapters 49.46, 49.48, or 49.52.

  • Repeat Violations Xxxxxxx agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.

  • No Violations Seller’s execution, delivery and performance of this Agreement and the other Transaction Documents to which the Seller is a party will not violate any provision of any existing law or regulation or any order or decree of any court or the Articles of Incorporation or Bylaws of Seller, or constitute a material breach of any mortgage, indenture, contract or other agreement to which Seller is a party or by which Seller or any of Seller’s properties may be bound.

  • ALLEGED VIOLATIONS ‌ At its discretion, NRMP will investigate alleged violations of this Agreement, including but not limited to:

  • Reporting Violations a) When appropriate, faculty members will submit timely written communication to their immediate supervisor any condition that comes to their attention that may, in their judgment, pose a threat to the health or safety of any person associated with the District.

  • No Violation The consummation of the transactions contemplated by this Agreement and the Basic Documents and the fulfillment of the terms of this Agreement and the Basic Documents shall not conflict with, result in any breach of any of the terms and provisions of or constitute (with or without notice, lapse of time or both) a default under the certificate of incorporation or by-laws of the Seller, or any indenture, agreement, mortgage, deed of trust or other instrument to which the Seller is a party or by which it is bound, or result in the creation or imposition of any Lien upon any of its properties pursuant to the terms of any such indenture, agreement, mortgage, deed of trust or other instrument, other than this Agreement, or violate any law, order, rule or regulation applicable to the Seller of any court or of any federal or state regulatory body, administrative agency or other governmental instrumentality having jurisdiction over the Seller or any of its properties.

  • Violations Promptly notify Agent in writing of any violation of any law, statute, regulation or ordinance of any Governmental Body, or of any agency thereof, applicable to any Borrower which could reasonably be expected to have a Material Adverse Effect on any Borrower.

  • Violation The Asset Representations Reviewer agrees that a violation of this Agreement may cause irreparable injury to the Issuer and the Servicer and the Issuer and the Servicer may seek injunctive relief in addition to legal remedies. If an action is initiated by the Issuer or the Servicer to enforce this Section 4.08, the prevailing party will be reimbursed for its fees and expenses, including reasonable attorney’s fees, incurred for the enforcement.

  • Penalties for Violations Design Professional and its subconsultants shall comply with California Labor Code section 1775 in the event a worker is paid less than the prevailing wage rate for the work or craft in which the worker is employed. This shall be in addition to any other applicable penalties allowed under Labor Code sections 1720 – 1861.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data management incidents should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!