Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Diligence Requirements Company shall use diligent efforts or shall cause its Affiliates or Sublicensees to use diligent efforts to develop Licensed Products and to introduce Licensed Products into the commercial market; thereafter, Company or its Affiliates or Sublicensees shall make Licensed Products reasonably available to the public. Specifically, Company or its Affiliates or Sublicensees shall fulfill the following obligations: (a) Within ninety (90) days after the Effective Date, Company shall furnish Medical School with a written research and development plan under which Company intends to develop Licensed Products. (b) Within sixty (60) days after each anniversary of the Effective Date, Company shall furnish Medical School with a written report on the progress of its efforts during the prior year to develop and commercialize Licensed Products, including without limitation research and development efforts, efforts to obtain regulatory approval, marketing efforts, and sales figures. The report shall also contain a discussion of intended efforts and sales projections for the current year. (c) Company shall endeavor to obtain all necessary governmental approvals for the manufacture, use and sale of Combination Product and Licensed Product. Specifically, Company shall: (i) Within eight (8) years after the Effective Date, file an Investigational New Drug Application (“IND”) or its equivalent covering at least one Combination Product or Licensed Product with the U.S. Food and Drug Administration (“FDA”); (ii) Within thirteen (13) years after the Effective Date, file a New Drug Application (“NDA”) with the FDA covering at least one Combination Product or Licensed Product; (iii) Within eighteen (18) months after receiving FDA approval of the NDA for a Combination Product or Licensed Product, market at least one Combination Product or Licensed Product in the U.S.; and (iv) reasonably fill the market demand for any Combination Product or Licensed Product following commencement of marketing of such product at any time during the exclusive period of this Agreement. (d) Within eighteen (18) months after the Effective Date, Company shall successfully undertake a public or private offering of raising ten million dollars ($10,000,000). (e) In addition to the obligations set forth above, Company or its Affiliates or Sublicensees shall spend (either directly or through sponsored research by Company or its Affiliates or Sublicensees at the Medical School) an aggregate of not less than {***} per calendar year for the development of Combination Product and/or Licensed Product commencing with the year 2004. Company shall have the responsibility to finance its obligations in this Section 3.1, and the Medical School shall provide reasonable cooperation to Company in this regard. In the event that Medical School determines that Company (or an Affiliate or Sublicensee) has not fulfilled its obligations under this Section 3.1., Medical School shall furnish Company with written notice of such determination. Within sixty (60) days after receipt of such notice, Company shall either (i) fulfill the relevant obligation or (ii) negotiate with Medical School a mutually acceptable schedule of revised diligence obligations, failing which Medical School shall have the right, immediately upon written notice to Company, to terminate this Agreement.
Entitlements and Purchasing Requirements You must purchase the appropriate number of Software Subscription(s), based on the number of Socket-pairs for all Managed Nodes being managed by the Red Hat CloudForms Software. A “Socket-pair” is up to two sockets each occupied by a CPU on a Managed Node. Red Hat CloudForms Software is configured to manage virtual machines on certain public clouds (a “Red Hat CloudForms Enabled Cloud”). You must purchase the appropriate number of Red Hat CloudForms for Public Cloud Software Subscriptions based on the number of Managed VMs instantiated on a Red Hat CloudForms Enabled Cloud. Please confirm that a specific public cloud is a Red Hat CloudForms Enabled Cloud prior to purchasing. A Red Hat Enterprise Linux Software Subscription is bundled with the Red Hat CloudForms Software Subscription and the fees for the Red Hat CloudForms Subscription are based on such bundled use. Any use of the Red Hat Enterprise Linux other than to run the Red Hat CloudForms Software is subject to Red Hat’s standard Software Subscription fees for such use.
COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.
Training Requirements Grantee shall: A. Authorize and require staff (including volunteers) to attend training, conferences, and meetings as directed by DSHS; B. Appropriately budget funds in order to meet training requirements in a timely manner, and ensure that staff and volunteers are trained as specified in the training requirements listed at xxxxx://xxx.xxxx.xxxxx.xxx/hivstd/training/ and as otherwise specified by DSHS. Grantee shall document that these training requirements are met; and C. Ensure that staff hired for HIV and syphilis testing are trained to perform blood draws within three (3) months of employment.
Compliance with Reporting Requirements The Company is subject to and in full compliance with the reporting requirements of Section 13 or Section 15(d) of the Exchange Act.
Subsidy Requests and Reporting Requirements 1. The Grantee or Management Company shall complete a CRF Subsidy Request Report - Recap of Tenant Income Certification, which provides a unit-by-unit listing of all units in the Development for whom assistance is being requested and gives detailed information including the occupants’ eligibility, set-aside requirements, amount of household rent paid, utility allowance and amount of CRF Rental Subsidy requested. 2. The CRF Subsidy Request Report - Recap of Tenant Income Certification shall be prepared as of the last day of each calendar month during the period of performance and shall be submitted to XXXXxxxxxxxx@XxxxxxxXxxxxxx.xxx and Florida Housing’s monitoring agent no later than the 15th day of the following month. The December 2020 request will be due on or before December 15th. The Grantee will submit executed Coronavirus Relief Fund Rental Assistance Applications and supporting documentation to Florida Housing’s monitoring agent within 5 days upon the monitoring agent’s request.
Conference requirement and procedure (i) The Employer, or the Employer’s representative, shall, when requested by the Employees or their Employee Representative/ Union Delegate, confer (within a reasonable period of time which should not exceed 1/2 hour) for the purpose of determining whether or not conditions are inclement. (ii) Provided that if the Employer or the Employers’ representative refuses to confer within such reasonable period, Employees shall be entitled to cease work for the rest of the day and be paid inclement weather.
Operating Requirements Any operating and technical requirements that may be applicable due to Regional Transmission Organization, Independent System Operator, control area, or the Connecting Transmission Owner’s requirements, including those set forth in the Small Generator Interconnection Agreement. Operating Requirements shall include Applicable Reliability Standards.
Compliance Requirements A. Nondiscrimination. The Contractor agrees to comply, and to require its subcontractor(s) to comply, with the nondiscrimination provisions of MCL 37.2209. The Contractor further agrees to comply with the provisions of Section 9:158 of Chapter 112 of the Xxx Arbor City Code and to assure that applicants are employed and that employees are treated during employment in a manner which provides equal employment opportunity.