Quality Control Procedures The Seller shall have an internal quality control program that verifies, on a regular basis, the existence and accuracy of the legal documents, credit documents, property appraisals, and underwriting decisions. The program shall include evaluating and monitoring the overall quality of the Seller's loan production and the servicing activities of the Seller. The program is to ensure that the Mortgage Loans are originated and serviced in accordance with Accepted Servicing Standards and the Underwriting Guidelines; guard against dishonest, fraudulent, or negligent acts; and guard against errors and omissions by officers, employees, or other authorized persons.
Access to Information Such Purchaser acknowledges that it has had the opportunity to review the Transaction Documents (including all exhibits and schedules thereto) and the SEC Reports and has been afforded, (i) the opportunity to ask such questions as it has deemed necessary of, and to receive answers from, representatives of the Company concerning the terms and conditions of the offering of the Securities and the merits and risks of investing in the Securities; (ii) access to information about the Company and its financial condition, results of operations, business, properties, management and prospects sufficient to enable it to evaluate its investment; and (iii) the opportunity to obtain such additional information that the Company possesses or can acquire without unreasonable effort or expense that is necessary to make an informed investment decision with respect to the investment. Such Purchaser acknowledges and agrees that neither the Placement Agent nor any Affiliate of the Placement Agent has provided such Purchaser with any information or advice with respect to the Securities nor is such information or advice necessary or desired. Neither the Placement Agent nor any Affiliate has made or makes any representation as to the Company or the quality of the Securities and the Placement Agent and any Affiliate may have acquired non-public information with respect to the Company which such Purchaser agrees need not be provided to it. In connection with the issuance of the Securities to such Purchaser, neither the Placement Agent nor any of its Affiliates has acted as a financial advisor or fiduciary to such Purchaser.
Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.
Post-Closing Access to Information For a period of seven (7) years from the Closing Date, except as prohibited by applicable Law, Seller and Buyer shall, subject to compliance by the other with the provisions of Section 5.12 and the Transition Services Agreement, afford to each other and to each other’s Representatives reasonable access and duplicating rights (with copying costs to be borne by the requesting party) during normal business hours to all books and records, documents and other information (collectively, “Information”) within the knowledge, possession or control of the other party or its Affiliates solely to the extent relating to (a) in the case of requests by Buyer, the FH Business, Transferred FH Companies (and their Closing Subsidiaries), FH Assets, the Acquired FH Assets, Assumed Liabilities or Transferred Employees and (b) in the case of requests by Seller, the Excluded Businesses, the Excluded Assets or the Retained Liabilities, insofar in each case as such access is reasonably required by Seller or Buyer or any of their Subsidiaries or Affiliates for legitimate business reasons and does not violate any applicable Law or any confidentiality obligations applicable to Seller or Buyer or any of their Subsidiaries or Affiliates, as the case may be (and shall use reasonable efforts to cause persons or firms possessing relevant Information to give similar access) and, to the extent practicable, such Information is identified by the requesting party with reasonable specificity; provided, however, that no party shall be required to disclose any Information if (i) it believes in good faith that doing so presents a significant risk, based on advice of counsel (which can be inside counsel) of resulting in a loss of the ability to successfully assert a claim of Privilege or (ii) Seller or any of its Subsidiaries, on the one hand, and Buyer or any of its Subsidiaries, on the other hand, are adverse parties in a litigation (other than a litigation with respect to a claim for indemnification under this Agreement) and such information is reasonably pertinent thereto; provided, further, that, in the case of clause (i) above, the parties hereto shall reasonably cooperate in seeking to find a way to allow disclosure of such information without resulting in a loss of the ability to successfully assert a claim of Privilege; provided, further, that Seller and its Affiliates shall not be required to provide Buyer or its Representatives with any information related to the Sale Process or Seller’s or its Representatives’ evaluation thereof, including projections, financial or other information related thereto other than projections, financial or other information prepared in the ordinary course of the FH Business without being primarily prepared for the Sale Process. Without limiting the generality of the foregoing, Information may be requested under this Section 5.9 for audit and accounting purposes and in connection with Actions, as well as for purposes of fulfilling disclosure and reporting obligations.
Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.
Access to Information and Records During the period commencing thirty (30) days prior to the Closing Date, the Seller shall give Buyer, its counsel, accountants and other representatives (i) access during normal business hours to all of the properties, books, records, contracts and documents of the Seller for the purpose of such inspection, investigation and testing as Buyer deems appropriate (and the Seller shall furnish or cause to be furnished to Buyer and its representatives all information with respect to the business and affairs of the Seller as Buyer may request); (ii) access to employees, agents and representatives for the purposes of such meetings and communications as Buyer reasonably desires; and (iii) access to vendors, customers, manufacturers of its machinery and equipment, and others having business dealings with the Seller. Through the Closing Date, the Buyer and its Affiliates shall not disclose any Proprietary Information obtained pursuant to this paragraph to any third parties and until the Closing Date will not use any such Proprietary Information in the Buyer's business or any affiliated business without the prior written consent of the Seller and then only to the extent specified in that consent. Consent may be granted or withheld at the sole discretion of the Seller. The Buyer shall not contact any suppliers, customers, employees, affiliates or associates to circumvent the purposes of this provision. The Buyer shall take all steps reasonably necessary or appropriate to maintain the strict confidentiality of the Proprietary Information through the Closing Date.
Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.
NMHS Governance, Safety and Quality Requirements 2.1 Participates in the maintenance of a safe work environment. 2.2 Participates in an annual performance development review. 2.3 Supports the delivery of safe patient care and the consumers’ experience including participation in continuous quality improvement activities in accordance with the requirements of the National Safety and Quality Health Service Standards and other recognised health standards. 2.4 Completes mandatory training (including safety and quality training) as relevant to role. 2.5 Performs duties in accordance with Government, WA Health, North Metropolitan Health Service and Departmental / Program specific policies and procedures. 2.6 Abides by the WA Health Code of Conduct, Occupational Safety and Health legislation, the Disability Services Act and the Equal Opportunity Act.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Access to Information; Independent Investigation Prior to the execution of this Agreement, the Subscriber has had the opportunity to ask questions of and receive answers from representatives of the Company concerning an investment in the Company, as well as the finances, operations, business and prospects of the Company, and the opportunity to obtain additional information to verify the accuracy of all information so obtained. In determining whether to make this investment, Subscriber has relied solely on Subscriber’s own knowledge and understanding of the Company and its business based upon Subscriber’s own due diligence investigation and the information furnished pursuant to this paragraph. Subscriber understands that no person has been authorized to give any information or to make any representations which were not furnished pursuant to this Section 2 and Subscriber has not relied on any other representations or information in making its investment decision, whether written or oral, relating to the Company, its operations and/or its prospects.