Agency Authorized to Monitor Subrecipient Sample Clauses

Agency Authorized to Monitor Subrecipient. Agency may monitor the activities of each Subrecipient and its Subgrantees and vendors as it deems necessary or appropriate, among other things, to ensure Subrecipient and its subgrantees comply with the terms of this Agreement and that Grant fund awards are used properly for authorized purposes hereunder. Agency also may the activities and records of Subrecipient and its Subgrantees and vendors to ensure that performance goals are achieved as specified in this Agreement, including without limitation in the Scope of Work and that performance is to the satisfaction of Agency. Monitoring activities may include any action deemed necessary or appropriate by Agency including, but not limited to the following: (1) the review (including copying) from time to time of any and all Subrecipient, Subgrantee, and Vendor files, records and other information of every type arising from or related to performance under this Agreement; (2) arranging for, performing, and evaluating general and limited scope audits; (3) conducting or arranging for on-site and field visits and inspections; (4) review of Subrecipient fiscal and program reports, and requiring appropriate Request for Funds documentation as well as such other information and clarification as it deems appropriate, prior to providing a Request for Funding approval, whether in whole, in part, or otherwise; and (5) evaluating, training, providing technical assistance and enforcing compliance of Subrecipient, Subgrantee(s), Vendors, and their officers, employees, agents, contractors and other staff. Agency may utilize third parties in its monitoring and enforcement activities, including monitoring by peer agencies. Agency monitoring and enforcement activities may be conducted in person, by telephone and by other means deemed appropriate by Agency and may be effected through contractors, agents or other authorized representatives. Subrecipient consents to such monitoring and enforcement by Agency and agrees to cooperate fully with same, including requiring by agreement and causing that its Subgrantees, Vendors and contractors so cooperate. Agency reserves the right, at its sole and absolute discretion, to request assistance in monitoring from outside parties including, but not limited to the Oregon Secretary of State, the Attorney General, the federal government, and law enforcement agencies.
AutoNDA by SimpleDocs

Related to Agency Authorized to Monitor Subrecipient

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Default Authorized User a. Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Authorized to do Business To the extent required under applicable law, as of the Cut-off Date or as of the date that such entity held the Mortgage Note, each holder of the Mortgage Note was authorized to transact and do business in the jurisdiction in which each related Mortgaged Property is located, or the failure to be so authorized does not materially and adversely affect the enforceability of such Mortgage Loan by the Trust.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Authorized Sub-processors Customer agrees that MailChimp may engage Sub-processors to process Customer Data on Customer's behalf. The Sub-processors currently engaged by MailChimp and authorized by Customer are listed in Annex A.

  • Authorized Users Authorized Users" are:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!