Agency Authorized to Monitor Grantee Sample Clauses

Agency Authorized to Monitor Grantee. Agency may monitor the activities of each Grantee and its Subrecipients and vendors as it deems necessary or appropriate, among other things, to ensure Grantee and its subrecipients comply with the terms of this Agreement and that Grant fund awards are used properly for authorized purposes hereunder. Agency also may monitor the activities and records of Grantee and its Subrecipients and vendors to ensure that Grantee’s obligations are achieved as specified in this Agreement, including without limitation in the Grant Activities and that performance is to the satisfaction of Agency. Monitoring activities may include any action deemed necessary or appropriate by Agency including, but not limited to the following: (1) the review (including copying) from time to time of any and all Grantee, Subrecipient, vendor and client files, records and other information of every type arising from or related to performance under this Agreement; (2) arranging for, performing, and evaluating general and limited scope audits;
AutoNDA by SimpleDocs
Agency Authorized to Monitor Grantee. Agency may monitor the activities of each Grantee and its Subrecipients and vendors as it deems necessary or appropriate, among other things, to ensure Grantee and its subrecipients comply with the terms of this Agreement and that Grant fund awards are used properly for authorized purposes hereunder. Agency also may monitor the activities and records of Grantee and its Subrecipients and vendors to ensure that performance goals are achieved as specified in this Agreement, including without limitation in the Scope of Work and that performance is to the satisfaction of Agency. Monitoring activities may include any action deemed necessary or appropriate by Agency including, but not limited to the following: (1) the review (including copying) from time to time of any and all Grantee, Subrecipient, and Vendor files, records and other information of every type arising from or related to performance under this Agreement; (2) arranging for, performing, and evaluating general and limited scope audits; (3) conducting or arranging for on-site and field visits and inspections; (4) review of Grantee fiscal and program reports, and requiring appropriate Request for Funds documentation as well as such other information and clarification as it deems appropriate, prior to providing a Request for Funding approval, whether in whole, in part, or otherwise; and
Agency Authorized to Monitor Grantee. Agency may monitor the activities of each Grantee and its Subrecipients and vendors as it deems necessary or appropriate, among other things, to ensure Grantee and its subrecipients comply with the terms of this Agreement and that Grant fund awards are used properly for authorized purposes hereunder. Agency also may the activities and records of Grantee and its Subrecipients and vendors to ensure that performance goals are achieved as specified in this Agreement, including without limitation in the Scope of Work and that performance is to the satisfaction of Agency. Monitoring activities may include any action deemed necessary or appropriate by Agency including, but not limited to the following: (1) the review (including copying) from time to time of any and all Grantee, Subrecipient, and Vendor files, records and other information of every type arising from or related to performance under this Agreement; (2) arranging for, performing, and evaluating general and limited scope audits; (3) conducting or arranging for on-site and field visits and inspections; (4) review of Grantee fiscal and program reports, and requiring appropriate Request for Funds documentation as well as such other information and clarification as it deems appropriate, prior to providing a Request for Funding approval, whether in whole, in part, or otherwise; and (5) evaluating, training, providing technical assistance and enforcing compliance of Grantee, Subrecipient(s), Vendors, and their officers, employees, agents, contractors and other staff. Agency may utilize third parties in its monitoring and enforcement activities, including monitoring by peer agencies. Agency monitoring and enforcement activities may be conducted in person, by telephone and by other means deemed appropriate by Agency and may be effected through contractors, agents or other authorized representatives. Grantee consents to such monitoring and enforcement by Agency and agrees to cooperate fully with same, including requiring by agreement and causing that its Subrecipients, Vendors and contractors so cooperate. Agency reserves the right, at its sole and absolute discretion, to request assistance in monitoring from outside parties including, but not limited to the Oregon Secretary of State, the Attorney General, the federal government, and law enforcement agencies.

Related to Agency Authorized to Monitor Grantee

  • Commissioner or Authorized User Contractor further warrants, covenants and represents that any confidential information obtained by Contractor, its agents, Subcontractors, officers, distributors, resellers or employees in the course of performing its obligations, including without limitation, security procedures, business operations information, or commercial proprietary information in the possession of the State or any Authorized User hereunder or received from another third party, will not be divulged to any third parties. Contractor shall not be required to keep confidential any such material that is publicly available through no fault of Contractor, independently developed by Contractor without reliance on confidential information of the Authorized User, or otherwise obtained under the Freedom of Information Act or other applicable New York State laws and regulations. This warranty shall survive termination of this Contract. Contractor further agrees to take appropriate steps as to its agents, Subcontractors, officers, distributors, resellers or employees regarding the obligations arising under this clause to insure such confidentiality.

  • Non-State Agency Authorized Users Authorized Users other than State Agencies are permitted to make purchases through state Centralized Contracts where permitted by law, the Contract or the Commissioner.

  • Bulk Registration Data Access to Icann Periodic Access to Thin Registration Data. In order to verify and ensure the operational stability of Registry Services as well as to facilitate compliance checks on accredited registrars, Registry Operator will provide ICANN on a weekly basis (the day to be designated by ICANN) with up-to-date Registration Data as specified below. Data will include data committed as of 00:00:00 UTC on the day previous to the one designated for retrieval by ICANN.

  • Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • Default Authorized User a. Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Registration Data Directory Services Until ICANN requires a different protocol, Registry Operator will operate a WHOIS service available via port 43 in accordance with XXX 0000, and a web-­‐based Directory Service at <whois.nic.TLD> providing free public query-­‐based access to at least the following elements in the following format. ICANN reserves the right to specify alternative formats and protocols, and upon such specification, the Registry Operator will implement such alternative specification as soon as reasonably practicable. Registry Operator shall implement a new standard supporting access to domain name registration data (SAC 051) no later than one hundred thirty-­‐five (135) days after it is requested by ICANN if: 1) the IETF produces a standard (i.e., it is published, at least, as a Proposed Standard RFC as specified in RFC 2026); and 2) its implementation is commercially reasonable in the context of the overall operation of the registry.

  • ELECTRONIC REGISTRATION In the event that the electronic registration system (hereinafter referred to as the “Teraview Electronic Registration System” or “TERS”) is operative in the applicable Land Titles Office in which the Property is registered, then at the option of the Vendor’s solicitor, the following provisions shall prevail, namely:

  • INFORMATION OF LOCKHEED XXXXXX (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. XXXXXX agrees to comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and to comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. XXXXXX agrees not to use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and agrees not to disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

Time is Money Join Law Insider Premium to draft better contracts faster.