Notice and Procedure for Reporting Violations Clause Samples

Notice and Procedure for Reporting Violations. (a) Reporting Non-Copyright Violations. EO encourages Users to report violations of the AUP by e-mail to ▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇, including in any such report the name of the offending domain (for example, ▇▇▇.▇▇▇), the IP address and the type of abuse (for example, spam, illegal acts, harassment, etc.) in the “subject” field of the e-mail. (b) Reporting Copyright Violations. EO respects the intellectual property of others and complies with the Digital Millennium Copyright Act (the “DMCA”). The DMCA, which heightens the penalties for copyright infringement on the Internet, sets forth the following requirements for notifying online service providers of alleged copyright infringement. If you believe that your work has been copied in a way that constitutes copyright infringement, please send notice of your claim to: DMCA Notices EFFORTLESS OFFICE ENTERPRISES LLC ▇▇▇▇ ▇. ▇▇▇▇▇▇▇ ▇▇▇▇, # ▇▇▇ ▇▇▇ ▇▇▇▇▇, ▇▇ ▇▇▇▇▇ Attention: Designated Copyright Agent It is EO’s policy to expeditiously remove content that is the subject of a correctly prepared notice under the DMCA. To be effective, your notice of copyright infringement must be written and must include the following (For more details on the information required for valid notification, see 17 U.S.C. § 512(c)(3)): (i) Your signature (physical or electronic) or the signature of a person authorized to act on your behalf; (ii) Identification of the copyrighted work that you claim has been infringed; (iii) Identification of the material that is claimed to be infringing as well as information reasonably sufficient to permit EO to locate the material; (iv) Information reasonably sufficient to permit EO to contact you, such as an address, telephone number, and, if available, an electronic mail address; (v) A statement that you have a good faith belief that use of the material in the manner complained of is not authorized by you, your agent, or the law; and (vi) A statement that, under penalty of ▇▇▇▇▇▇▇, the information in the notification is accurate. EO encourages you to consult a lawyer before submitting a notice of copyright infringement. Customer should be aware that, under the DMCA, claimants who make misrepresentations concerning copyright infringement may be liable for damages incurred as a result of the removal or blocking of the material, court costs, and attorneys’ fees.

Related to Notice and Procedure for Reporting Violations

  • Notice and Procedures Promptly after receipt by an indemnified party under subsection (a) or (b) above of notice of the commencement of any action, such indemnified party shall, if a claim in respect thereof is to be made against the indemnifying party under such subsection, notify the indemnifying party in writing of the commencement thereof; but the omission so to notify the indemnifying party shall not relieve the indemnifying party from any liability that it may have to any indemnified party except to the extent such indemnifying party has been materially prejudiced by such failure. In case any such action shall be brought against any indemnified party, and it shall notify the indemnifying party of the commencement thereof, the indemnifying party shall be entitled to participate in, and, to the extent that it shall wish, jointly with any other indemnifying party similarly notified, to assume the defense thereof, with counsel reasonably satisfactory to such indemnified party, and after notice from the indemnifying party to such indemnified party of the indemnifying party’s election so to assume the defense thereof, the indemnifying party shall not be liable to such indemnified party under such subsection for any legal or other expenses subsequently incurred by such indemnified party in connection with the defense thereof other than reasonable costs of investigation; provided, however, that if, in the sole judgment of the Agent, it is advisable for the Agent to be represented by separate counsel, the Agent shall have the right to employ a single counsel to represent the Agent, in which event the reasonable fees and expenses of such separate counsel shall be borne by the indemnifying party or parties and reimbursed to the Agent as incurred (in accordance with the provisions of the second paragraph in subsection (a) above). The indemnifying party under this Section 5 shall not be liable for any settlement of any proceeding effected without its written consent, but if settled with such consent or if there be a final judgment for the plaintiff, the indemnifying party agrees to indemnify the indemnified party against any loss, claim, damage, liability or expense by reason of such settlement or judgment. Notwithstanding the foregoing sentence, if at any time an indemnified party shall have requested an indemnifying party to reimburse the indemnified party for fees and expenses of counsel as contemplated by this Section 5, the indemnifying party agrees that it shall be liable for any settlement of any proceeding effected without its written consent if (i) such settlement is entered into more than 30 days after receipt by such indemnifying party of the aforesaid request, (ii) such indemnifying party shall have received notice of the terms of such settlement at least 30 days prior to such settlement being entered into, and (iii) such indemnifying party shall not have reimbursed the indemnified party in accordance with such request prior to the date of such settlement. No indemnifying party shall, without the prior written consent of the indemnified party, effect any settlement, compromise or consent to the entry of judgment in any pending or threatened action, suit or proceeding in respect of which any indemnified party is or could have been a party and indemnity was or could have been sought hereunder by such indemnified party, unless such settlement, compromise or consent (a) includes an unconditional release of such indemnified party from all liability on claims that are the subject matter of such action, suit or proceeding and (b) does not include a statement as to or an admission of fault, culpability or a failure to act by or on behalf of any indemnified party.

  • Notice and Procedure Promptly after the Indemnified Party receives any claim or notice of the commencement of any action, administrative or legal proceeding, or investigation as to which the indemnity provided for in Sections 23.1 through 23.3 may apply, the Indemnified Party shall notify the Indemnifying Party in writing of such fact; provided, however, that the rights of the Indemnified Party shall not be forfeited by the failure to give the Indemnifying Party notice to the extent that said failure does not have a material and adverse effect on the defense of the matter. The Indemnifying Party shall assume on behalf of the Indemnified Party, and conduct with due diligence and in good faith, the defense thereof with counsel reasonably satisfactory to the Indemnified Party; provided, however, that the Indemnifying Party shall not settle any such action or investigation unless approved by the Indemnified Party (which approval shall not be unreasonably withheld). Notwithstanding the foregoing, (a) the Indemnified Party shall have the right to be represented in any such action or investigation by advisory counsel of its own selection and at its own expense, and (b) if the Indemnified Party shall have reasonably concluded that (i) there may be legal defenses available to it that are different from, or additional to, or inconsistent with, those available to the Indemnifying Party, or (ii) there exists a conflict of interest between the Indemnifying Party and the Indemnified Party, then, in either case, the Indemnified Party shall have the right to select separate counsel to participate in the defense of such action on its own behalf and the Indemnifying Party shall indemnify the Indemnified Party for the fees and expenses of such separate counsel. If any claim, action, proceeding or investigation arises as to which the indemnity provided for in Section 23.1, 23.2 or 23.3 applies and the Indemnifying Party fails to assume the defense of such claim, action, proceeding or investigation, then the Indemnified Party may, at the Indemnifying Party’s expense, contest or settle such claim, and the Indemnifying Party shall remain obligated to indemnify the Indemnified Party for any and all losses, damages, and liability (including, without limitation, attorneys’ fees and expenses) associated therewith. The payment of the indemnity pursuant to this Section 23.5 shall not be predicated on the Indemnified Party having made payment on any suit, action, loss, damage, claim or liability.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.