Notification Obligations (a) If by reason of a Political Event or Change in Law a Party is wholly or partially unable to carry out its obligations under this Agreement, the affected Party shall: (i) give each other Party notice of the Political Event or Change in Law as soon as practicable, but in any event, not later than three (3) Days after the affected Party became aware, or should have become aware, of the occurrence of the Political Event or Change in Law or six (6) hours after the resumption of any means of providing notice between the Company and the GOB, whichever is later; and (ii) give each other Party a second notice, describing the Political Event or Change in Law in reasonable detail and, to the extent that can be reasonably determined at the time of the second notice, providing a preliminary evaluation of the obligations affected, a preliminary estimate of the period of time that the affected Party will be unable to perform the obligations, and other relevant matters as soon as practicable, but in any event, not later than seven (7) Days after the initial notice of the occurrence of the Political Event or Change in Law is given by the affected Party. When appropriate or when reasonably requested to do so by any other Party, the affected Party shall provide further notices to the other Party more fully describing the Political Event or Change in Law and its cause and providing or updating information relating to the efforts of the affected Party to avoid and/or to mitigate the effect(s) thereof and estimates, to the extent practicable, of the time that the affected Party reasonably expects it will be unable to carry out any of its affected obligations due to the Political Event or Change in Law. (b) The affected Party shall also provide notice to each other Party of: (i) with respect to an ongoing Political Event or Change in Law the cessation of the Political Event or Change in Law; and (ii) its ability to recommence performance of its obligations under this Agreement, as soon as possible, but in any event, not later than seven (7) Days after the occurrence of each of (i) and (ii) above. (c) Failure by the affected Party to give notice of a Political Event or Change in Law to the other Parties within the ten (10) Day period or one (1) Business Day period required by Section 11A.2(a) shall not prevent the affected Party from giving such notice at a later time; provided, that in such case, the affected Party shall not be excused pursuant to Section 11A.4 for any failure or delay in complying with its obligations under or pursuant to this Agreement until the notice required by Section 11A.2(a)(i) has been given; and if such notice is given within the three (3) Day period or six (6) hour period as required by Section 11A.2(a)(i), the affected Party shall be excused for such failure or delay pursuant to Section 11A.4 from the date of commencement of the relevant Political Event or Change in Law.
Cooperation obligations The Parties undertake to cooperate to allow the timely submission, examination, publication and defence of any dissertation or thesis for a degree that includes their Results or Background subject to the confidentiality and publication provisions agreed in this Consortium Agreement.
PERSONAL DATA PROTECTION 7.1 By accessing ESZAM AUCTIONEER SDN BHD website, the E-Bidders acknowledge and agree that ESZAM AUCTIONEER SDN BHD website may collect, retain, or disclose the E-Bidder’s information or any information by the e-bidders for the effectiveness of services, and the collected, retained or disclosed information shall comply with Personal Data Protection Act 2010 and any regulations, laws or rules applicable from time to time. 7.2 ESZAM AUCTIONEER SDN BHD will process E-bidder personal data such as name, address, NRIC and contact number for registration and E-bidding purposes. E-bidders shall be responsible for the username and password of eZ2Bid and not to reveal the password to anyone. 7.3 E-bidders agree to accept all associated risks when using the service in the ESZAM AUCTIONEER SDN BHD website and shall not make any claim for any unauthorized access or any consequential loss or damages suffered. 7.4 E-bidders shall be responsible for the confidentiality and the use of password and not to reveal the password to anyone at any time and under any circumstances, whether intentionally or unintentionally. 7.5 E-bidders agree to comply with all the security measures related to safety of the password or generally in respect of the use of the service. 7.6 E-bidders accept the responsibility that in any event that the password is in the possession of any other person whether intentionally or unintentionally, the E-Bidders shall take precautionary steps for the disclosure, discovery, or the Bidders shall immediately notify ESZAM AUCTIONEER SDN BHD
Rights Protection Mechanisms and Abuse Mitigation ‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.