Access to Finance Sample Clauses

Access to Finance. The key factor hindering SME growth and development in Slovenia is access to finance, as SMEs find it more and more difficult to obtain loans, while the latter, to make matters worse, are more expensive than those provided to large business entities by banks.49 Moreover, a large number of enterprises are over-indebted, and business assets are severely deteriorating. The volume of loans to the non-bank sector decreased considerably in 2012. The same trends are indicated for 2013.50, 51 Facilitating access to finance with existing instruments, and alternative and innovative forms has thus become essential to promoting SME growth and development; therefore, special attention will be placed on the development of financial instruments. Financial instruments in Slovenia are implemented by a number of institutions: funds, the Slovenian Development Bank, venture capital funds and other financial intermediaries. The consequence is the dispersal and duplication of financing, and non-transparency of measures for beneficiaries. A transparent ESIF implementation system will bring together the relevant financial intermediaries and ensure an integrated approach to financing projects/measures. Apart from the use of the instruments in support of investments in SMEs, in particular innovative SMEs, financial instruments will be used for other purposes (e.g. RDI, training, business processes, energy and material efficiency, etc.) and, in addition to traditional forms of enterprise (companies and sole traders), for other forms of conducting a business activity, whereby a combination of both reimbursable and non-reimbursable funds will be used to finance the measures. At the financial instrument level, funds under different European funds will be combined. A number of financial instruments will be identified in accordance with the gap analysis for Slovenia. Therefore, synergy effects and linkages to measures supported under other thematic objectives (1, 4, 6, 8, 9 and 10) will be ensured in order for TO 3 objectives to contribute to the objectives of those thematic objectives. 48xxxx://xxx.xxxx.xx/novica_prikazi.aspx?id=5420 49 xxxx://xx.xxxxxx.xx/enterprise/policies/sme/facts-figures-analysis/performance-review/files/countries-sheets/2012/slovenia_sl.pdf 50 xxxx://xx.xxxxxx.xx/enterprise/policies/industrial-competitiveness/monitoring-member-states/files/ms-compet-report-2013_en.pdf 51 Bulletin of the Bank of Slovenia, May 2013; xxxx://xxx.xxx.xx/iskalniki/bilteni.asp?MapaId=22...
AutoNDA by SimpleDocs
Access to Finance. The EIP objective of increasing access to finance for the start-up and growth of SMEs is served primarily by one measure (Financial Instruments for SMEs) that includes two instruments – the GIF (High Growth and Innovative SME facility) and the SMEG (SME Guarantee facility). The measure – with an envisaged allocation of at least 50% of the total EIP budget – is being implemented continuously on an annual basis over the seven year period of the Programme. Other actions were covered under the general umbrella of “Improving policies on access to finance” including studies, workshops and reports. The overall objective of the measure is to improve access to finance for the start-up and growth of SMEs and investment in innovation activities (including eco-innovation) and the expected results of the two proposed actions are to increase the level of investment volumes of risk capital funds and investment vehicles promoted by business angels and to provide leverage to SME debt financing instruments, primarily in the form of bank loan guarantees. The two instruments are underpinned by a strong market failure rationale and aim to address the financial constraints faced by start-up and growing SMEs. The EIP financial instruments are not directly granted to SMEs. They are implemented on behalf of the Commission by the European Investment Fund (EIF) via selected financial intermediaries (venture capital funds and business angels in the case of GIF and guarantee institutions and promotional and commercial banks in the case of SMEG). This delivery mechanism is based on specific contracts, signed by intermediaries with the EIF, that concern the total fund size to be created and the expected share of EC funding or level of guarantee provided. Small businesses contact the selected financial intermediaries directly, in order to gain access to investment capital or benefit from the guarantees provided by the SMEG. The supervision and monitoring of the Financial Instruments from the Commission side has been a shared and co-ordinated responsibility with Unit E.3 of DG Enterprise and Industry leading on the policy side and Unit L2 of DG Economic and Financial Affairs responsible for the budget line and implementation (with DG Environment E4 consulted on the eco-innovation elements in GIF). In terms of identifying the impacts of the financial measures, there is a long chain from DG Enterprise and Industry through DG Economic and Financial Affairs, the EIF and the individual financi...
Access to Finance. Provision of Sub-loans by Eligible PFIs to support investment and working capital financing needs of Beneficiary Enterprises.
Access to Finance. Limited access to affordable financing and hard currency shortages, and an inability to secure default insurance all limit the private sector’s ability to invest in its own expansion.
Access to Finance. In the same way that support might not be available, the legal structure of the organisation may prevent investment from investing bodies. Social enterprises may be seen as an increased risk than for private individuals (such as crowdfunding). • Market Opportunities: Selling products and services to private or public bodies or other adult work-based education providers has been challenging in Ireland. The Irish Social Enterprise Network has provided a BuySocial movement in line with best international practices and examples; however, the issue requires resources. Procurement will begin to change in Ireland with more organisations including social and community benefit clauses in procurement. But there are only a few examples at the moment and social enterprises are not able to scale to the extent that they might be able to in future. • Legal form: There is no defined legal form for social enterprise in Ireland. According to the National Social Enterprise Policy 2019-2022, the definition does not specifically state the legal form that is required. The ambiguity makes it more difficult to define a social enterprise. There is research being completed in Ireland with the DRCD and Rethink that will be made available on 6th October 2021 that will shed more light on the topic. • Data and Impact: There is relatively little known about the social enterprise sector and all the organisations that make it up.
Access to Finance. This criterion defines the current situation in accessing private and public funds and other investment mechanisms. It examines the conditions that create an environment where innovations can evolve, reach the market and become widely used.
Access to Finance. Did Applicants increase access to sustainable sources of financing during and after the proposal development process?
AutoNDA by SimpleDocs

Related to Access to Finance

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Facility 13.1 Each Party shall ensure that its facilities are secured at all times. 13.2 The Customer shall permit and, if the land on which the Facility is located is not owned by Customer, cause such landowner to permit, the Distributor's employees and agents to enter the property on which the Facility is located at any reasonable time. Such access shall be provided for the purposes of inspecting and/or testing the Facility as and when permitted by this Agreement, the Code or the Distributor’s Conditions of Service or as required to ensure the continued safe and satisfactory operation of the Facility, to ensure the accuracy of the Distributor's meters, to establish work protection, or to perform work. 13.3 Any inspecting and/or testing referred to in section 13.2 shall not relieve the Customer from its obligation to operate and maintain the Facility and any related equipment in a safe and satisfactory operating condition and in accordance with this Agreement. 13.4 The Distributor shall have the right to witness any testing done by the Customer of the Facility and, to that end, the Customer shall provide the Distributor with at least fifteen working days advance notice of the testing. 13.5 Notwithstanding section 10.1, where the Distributor causes damage to the Customer's property as part of this access, the Distributor shall pay to the Customer the Customer's reasonable costs of repairing such property or, if such property cannot be repaired, replacing such property. 13.6 Notwithstanding section 10.1, if the Customer has been given access to the Distributor’s property, and if the Customer causes damage to the Distributor’s property as part of that access, the Customer shall pay to the Distributor the Distributor’s reasonable costs of repairing such property or, if such property cannot be repaired, replacing such property.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Facilities Each of the Company and each of its Subsidiaries will permit any representatives designated by the Purchaser (or any successor of the Purchaser), upon reasonable notice and during normal business hours, at such person's expense and accompanied by a representative of the Company, to: (a) visit and inspect any of the properties of the Company or any of its Subsidiaries; (b) examine the corporate and financial records of the Company or any of its Subsidiaries (unless such examination is not permitted by federal, state or local law or by contract) and make copies thereof or extracts therefrom; and (c) discuss the affairs, finances and accounts of the Company or any of its Subsidiaries with the directors, officers and independent accountants of the Company or any of its Subsidiaries. Notwithstanding the foregoing, neither the Company nor any of its Subsidiaries will provide any material, non-public information to the Purchaser unless the Purchaser signs a confidentiality agreement and otherwise complies with Regulation FD, under the federal securities laws.

  • Access to Financial Information Buyer’s representatives shall have access to, and Seller and its Affiliates shall cooperate with Buyer and furnish upon request, all financial and other information relating to the Hotel’s operations to the extent necessary to enable Buyer’s representatives to prepare audited financial statements in conformity with Regulation S-X of the Securities and Exchange Commission (the “SEC”) and other applicable rules and regulations of the SEC and to enable them to prepare a registration statement, report or disclosure statement for filing with the SEC on behalf of Buyer or its Affiliates, whether before or after Closing and regardless of whether such information is included in the Records to be transferred to Buyer hereunder. Seller shall also provide to Buyer’s representative a signed representation letter in form and substance reasonably acceptable to Seller sufficient to enable an independent public accountant to render an opinion on the financial statements related to the Hotel. Buyer will reimburse Seller for costs reasonably incurred by Seller to comply with the requirements of the preceding sentence to the extent that Seller is required to incur costs not in the ordinary course of business for third parties to provide such representation letters. The provisions of this Section shall survive Closing or termination of this Contract.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!