Repeat Violations ▇▇▇▇▇▇ agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.
WAGE VIOLATIONS Contractor represents and warrants as previously certified in Contractor’s Bidder’s Certification, that during the term of this Contract and the three (3) year period immediately preceding the award of the Contract, Contractor has not been determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW 49.46, 49.48, or 49.52.
Prior Disaster Relief Contract Violation Under Sections 2155.006 and 2261.053 of the Texas Government Code (relating to convictions and penalties regarding Hurricane ▇▇▇▇, Hurricane ▇▇▇▇▇▇▇, and other disasters), the Contractor certifies that the individual or business entity named in this Contract and any related Solicitation Response is not ineligible to receive this Contract and acknowledges that this Contract may be terminated and payment withheld if this certification is inaccurate.
Authority; Compliance With Other Agreements and Instruments and Government Regulations The execution, delivery and performance by Borrower and the Subsidiary Guarantors of the Loan Documents to which it is a Party have been duly authorized by all necessary corporate action, and do not and will not: (a) Require any consent or approval not heretofore obtained of any partner, director, stockholder, security holder or creditor of such Party; (b) Violate or conflict with any provision of such Party's charter, articles of incorporation or bylaws, as applicable; (c) Result in or require the creation or imposition of any Lien (other than pursuant to the Loan Documents) or Right of Others upon or with respect to any Property now owned or leased or hereafter acquired by such Party; (d) Violate any Requirement of Law applicable to such Party; (e) Result in a breach of or constitute a default under, or cause or permit the acceleration of any obligation owed under, any material indenture or loan or credit agreement or any other Contractual Obligation to which such Party is a party or by which such Party or any of its Property is bound or affected; and such Party is not in violation of, or default under, any Requirement of Law or Contractual Obligation, or any material indenture, loan or credit agreement described in Section 4.2(e), in any respect that constitutes a Material Adverse Effect.
Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.