Notifiable incidents and contraventions Sample Clauses

Notifiable incidents and contraventions. (a) If the Recipient is required by a WHS Law to report to a Regulator an incident arising out of the Project:
AutoNDA by SimpleDocs
Notifiable incidents and contraventions. (a) If the Project Host is required by a WHS Law to report to a Regulator an incident arising out of the project:
Notifiable incidents and contraventions. If the Recipient is required by the WHS Act to report a Notifiable Incident to the Regulator arising out of the Activity: at the same time, or as soon as is possible in the circumstances, the Recipient must give notice of such incident, and a copy of any written notice provided to the Regulator, to the Department; and the Recipient must provide to the Department, within such time as is specified by the Department, a report detailing the circumstances of the incident, the results of investigations into its cause, and any recommendations or strategies for prevention in the future. The Recipient must inform the Department of the full details of: any suspected contravention of the WHS Laws relating to the Activity, within 24 hours of becoming aware of any such suspected contravention; any cessation or direction to cease work relating to the Activity, due to unsafe work, immediately upon the Recipient being informed of any such cessation or direction; any workplace entry by a WHS Entry Permit Holder, or an inspector, to any place where the Activity is being performed or undertaken, within 24 hours of becoming aware of any such workplace entry; and any proceedings against the Recipient or its officers, or any decision or request by the Regulator given to the Recipient or its officers, under the WHS Laws, within 24 hours of becoming aware of any such proceedings, decision or request. The Recipient must ensure the relevant Research Organisation is required to give notice to the Recipient in the event of a Notifiable Incident on the same terms as the above.
Notifiable incidents and contraventions. (a) If the Recipient is required by the WHS Act to report a Notifiable Incident to the Regulator arising out of the Activity:

Related to Notifiable incidents and contraventions

  • OBLIGATIONS AND ACTIVITIES OF CONTRACTOR AS BUSINESS ASSOCIATE 1. Contractor agrees not to use or further disclose PHI County discloses to Contractor other than as permitted or required by this Business Associate Contract or as required by law.

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Your Liability for Unauthorized Transactions This section applies to unauthorized transactions involving Your username, password or security code and other unauthorized transactions. Notify Us AT ONCE if You believe that Your username, password or security code has been lost, stolen or has been learned by an unauthorized person. You acknowledge and agree that such notification must be initiated by calling (000) 000-0000 (Bask Bank Customer Support) followed by written confirmation. Furthermore, You acknowledge and agree that the written confirmation must be received by Us within ten (10) calendar days from the date of Your oral notification. If You assert that an unauthorized transfer may have occurred, or You believe Your username, password, or other security code has become known to an unauthorized person, We may require You to sign a sworn statement/affidavit to that effect. If You have selected optional Mobile Banking Services, You understand that You are solely responsible for notifying Us immediately in the event that Your Mobile Device associated with the telephone number provided to Us to register for Mobile Banking Services is lost, stolen, changed or destroyed. You understand that with regard to SMS text messages, failure to promptly notify Us may result in Your failure to receive important SMS text messages and/or the interception of such SMS text messages by unauthorized third parties. You may also incur SMS text messaging fees for such SMS text messages even if You do not receive them. You understand that We are not responsible for any costs, expenses, liabilities or damages that You incur as a result of Your failure to receive an SMS text message, the interception of any SMS text message by an unauthorized or other third party, or Your incurrence of SMS text messaging fees for SMS text messages You did not receive. YOU UNDERSTAND AND ACKNOWLEDGE THAT IN ADDITION TO ANY DISCLAIMERS OR LIMITATIONS OF LIABILITY AS OTHERWISE STATED IN THESE TERMS, IN OTHER AGREEMENTS BETWEEN THE PARTIES, OR PROVIDED BY LAW, WE SHALL NOT BE LIABLE FOR LOSSES OR DAMAGES ARISING FROM: (i) NON-DELIVERY, DELAYED DELIVERY OR WRONG DELIVERY OF ANY E-MAIL COMMUNICATION THAT YOU WOULD NORMALLY ACCESS VIA THE WEB BROWSER ON YOUR MOBILE DEVICE OR OF ANY SMS TEXT MESSAGE NORMALLY SENT DIRECTLY TO YOUR MOBILE DEVICE; (ii) INACCURATE CONTENT IN ANY E-MAIL COMMUNICATION THAT YOU ACCESS VIA THE WEB BROWSER ON YOUR MOBILE DEVICE OR IN ANY SMS TEXT MESSAGE SENT DIRECTLY TO YOUR MOBILE DEVICE; (iii) ANY ACTIONS RESULTING FROM THE INTENTIONAL OR UNINTENTIONAL DISCLOSURE BY YOU TO ANY UNAUTHORIZED PERSON OF THE CONTENTS OF ANY E-MAIL COMMUNICATION YOU ACCESS VIA THE WEB BROWSER ON YOUR MOBILE DEVICE OR ANY SMS TEXT MESSAGE SENT DIRECTLY TO YOUR MOBILE DEVICE; OR YOUR USE OR RELIANCE ON THE CONTENTS OF ANY SUCH E-MAIL OR SMS TEXT MESSAGE FOR ANY PURPOSE. For any transactions processed through the VISA or MasterCard system, Your liability limits will differ from those set forth in this section. For certain transactions processed through the Visa or MasterCard system, You may have no liability if You report the unauthorized transactions to Us, in accordance with each network’s respective “zero liability” policies for unauthorized transactions. We may, however, impose greater liability, up to the extent allowed by law, if We reasonably determine that You were either grossly negligent (e.g., delay for an unreasonable time in reporting unauthorized transactions) or fraudulent in handling Your Services transactions processed through the VISA or MasterCard system. The risk to You in failing to notify Us is the potential loss of all funds in Your Account. If You notify Us within two (2) Business Days after You learn of the loss, theft or compromise thereof by an unauthorized person, Your liability is up to $50 for an unauthorized Electronic Funds Transfer or series of related unauthorized Electronic Funds Transfers should someone use Your username, password or security code without Your permission. If You DO NOT notify Us within two (2) Business Days after You learn of the loss, theft or compromise thereof by an unauthorized person of Your username, password or security code and We can prove that We could have stopped someone from using Your username, password or security code had You informed Us of the loss, theft or compromise thereof, Your liability could be as much as $500. Failure to notify Us of any unauthorized Electronic Funds Transfer should someone use Your username, password or security code within sixty (60) calendar days of when the first periodic statement which reflected such unauthorized activity was mailed or otherwise made available to You could result in additional losses by You of 100 percent. We may extend the sixty (60) calendar day timeframe when certain events prevent You from notifying Us promptly, such as extended travel or hospital stay. Upon verification, We will extend the timeframe set forth herein to a timeframe deemed reasonable under such circumstances in accordance to Regulation E. In addition, unless prohibited by law, You agree to reimburse Us for any liability, loss, cost and expense We may incur in connection with Your Account except to the extent they are caused solely by Our intentional misconduct. Children Using the Services The safety and privacy protection of children is very important to Us. Children should always ask their parent or guardian for permission before sending personal information to anyone online. You understand that for a child under the age of 13, only the child’s parent or legal guardian has authority to access the Services, even if the account has been established on behalf of that child. If You permit a child under the age of 13 to use the Services, or give the child Your username or password, You understand that You are responsible for all activity the child initiates from or to any of Your accounts, even if he or she exceeds Your authorization. You understand that You can contact Us at the information listed in the “Our Customer Support Information” section of these Terms with any questions or concerns. Our Use of Third-party Service Providers Our ability to provide certain Services and Mobile Banking Services depends on our ability to provide access to third-party networks. You authorize Us to utilize third- party service providers selected by Us to provide Services to You on Our behalf. For details regarding Our safeguarding of Your personal information, please refer to the Online Privacy Policy. In the event that We determine, in Our sole discretion, that We are unable to provide third-party network access, We may discontinue the related Service(s) or may provide the Service(s) through alternate third-party networks. You understand that We shall have no liability for the unavailability of access during any transition period, and shall give You written notice of any Service involving transfers to or from Your deposit account(s) being discontinued at least twenty- one(21) days in advance of such termination, unless such prior notice is otherwise excused by law.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Collection of Personal Information 10.1 The Subscriber acknowledges and consents to the fact that the Company is collecting the Subscriber's personal information for the purpose of fulfilling this Subscription Agreement and completing the Offering. The Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) may be disclosed by the Company to (a) stock exchanges or securities regulatory authorities, (b) the Company's registrar and transfer agent, (c) Canadian tax authorities, (d) authorities pursuant to the Proceeds of Crime (Money Laundering) and Terrorist Financing Act (Canada) and (e) any of the other parties involved in the Offering, including legal counsel, and may be included in record books in connection with the Offering. By executing this Subscription Agreement, the Subscriber is deemed to be consenting to the foregoing collection, use and disclosure of the Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) and to the retention of such personal information for as long as permitted or required by law or business practice. Notwithstanding that the Subscriber may be purchasing Shares as agent on behalf of an undisclosed principal, the Subscriber agrees to provide, on request, particulars as to the identity of such undisclosed principal as may be required by the Company in order to comply with the foregoing.

  • Unauthorized Transactions You are not responsible for unauthorized Transactions. A Transaction is considered an “unauthorized Transaction” if we complete an investigation and determine that: • The Account was used by someone other than you; • You did not receive any benefit from the Transaction; • You co-operated fully with us in our investigation; and • You followed your responsibilities under this Agreement, including in these sections:

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

  • Third Party Acknowledgements A. Portions of the Apple Software utilize or include third party software and other copyrighted material. Acknowledgements, licensing terms and disclaimers for such material are contained in the electronic documentation for the Apple Software, and your use of such material is governed by their respective terms.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

Time is Money Join Law Insider Premium to draft better contracts faster.