When a takeover is initiated from a secondary database, a hostile takeover is performed, where the secondary database assumes a primary role without involving the original primary database.
You should consider a hostile takeover only in a disaster recovery situation in which the primary site is lost and it is no longer viable to restore and recover the primary database.