Anti-Corruption Laws and Sanctions The Borrower has implemented and maintains in effect policies and procedures designed to ensure compliance by the Borrower, its Subsidiaries and their respective directors, officers, employees and agents with Anti-Corruption Laws and applicable Sanctions, and the Borrower, its Subsidiaries and their respective officers and employees and to the knowledge of the Borrower its directors and agents, are in compliance with Anti-Corruption Laws and applicable Sanctions in all material respects. None of (a) the Borrower, any Subsidiary or any of their respective directors, officers or employees, or (b) to the knowledge of the Borrower, any agent of the Borrower or any Subsidiary that will act in any capacity in connection with or benefit from the credit facility established hereby, is a Sanctioned Person. No Borrowing or Letter of Credit, use of proceeds or other transaction contemplated by this Agreement will violate any Anti-Corruption Law or applicable Sanctions.
Data Protection Act 7.1 With respect to the parties' rights and obligations under this Contract, the parties agree that the Department is the Data Controller and that the Contractor is the Data Processor. 7.2 The Contractor shall: 7.2.1 Process the Personal Data only in accordance with instructions from the Department (which may be specific instructions or instructions of a general nature as set out in this Contract or as otherwise notified by the Department to the Contractor during the Term); 7.2.2 Process the Personal Data only to the extent, and in such manner, as is necessary for the provision of the Services or as is required by Law or any Regulatory Body; 7.2.3 The Contractor shall employ appropriate organisational, operational and technological processes and procedures to keep the Personal Data safe from unauthorised use or access, loss, destruction, theft or disclosure. The organisational, operational and technological processes and procedures adopted are required to comply with the requirements of ISO/IEC 27001 as appropriate to the services being provided to the Department; 7.2.4 Take reasonable steps to ensure the reliability of any Contractor Personnel who have access to the Personal Data; 7.2.5 Obtain prior written consent from the Department in order to transfer the Personal Data to any Sub-contractors or Affiliates for the provision of the Services; 7.2.6 Ensure that all Contractor Personnel required to access the Personal Data are informed of the confidential nature of the Personal Data and comply with the obligations set out in this clause 7; 7.2.7 Ensure that none of Contractor Personnel publish, disclose or divulge any of the Personal Data to any third party unless directed in writing to do so by the Department; 7.2.8 Notify the Department within five Working Days if it receives: a request from a Data Subject to have access to that person's Personal Data; or a complaint or request relating to the Department's obligations under the Data Protection Legislation; 7.2.9 Provide the Department with full cooperation and assistance in relation to any complaint or request made, including by: - providing the Department with full details of the complaint or request; - complying with a data access request within the relevant timescales set out in the Data Protection Legislation and in accordance with the Department's instructions; - providing the Department with any Personal Data it holds in relation to a Data Subject (within the timescales required by the Department); and - providing the Department with any information requested by the Department; 7.2.10 Permit the Department or the Department’s Representative (subject to reasonable and appropriate confidentiality undertakings), to inspect and audit the Contractor's data Processing activities (and/or those of its agents, subsidiaries and Sub-contractors) and comply with all reasonable requests or directions by the Department to enable the Department to verify and/or procure that the Contractor is in full compliance with its obligations under this Contract; 7.2.11 Provide a written description of the technical and organisational methods employed by the Contractor for processing Personal Data (within the timescales required by the Department) to be used solely for the purposes of this contract and provided that to do so would not be in breach of the Intellectual Property Rights (including Copyright) of a third party; and 7.2.12 Not process Personal Data outside the European Economic Area without the prior written consent of the Department and, where the Department consents to a transfer, to comply with: - the obligations of a Data Controller under the Eighth Data Protection Principle set out in Schedule 1 of the Data Protection Act 1998 by providing -an adequate level of protection to any Personal Data that is transferred; and - any reasonable instructions notified to it by the Department. 7.3 The Contractor shall comply at all times with the Data Protection Legislation and shall not perform its obligations under this Contract in such a way as to cause the Department to breach any of its applicable obligations under the Data Protection Legislation.
Compliance with Applicable Anti-Terrorism and Anti-Money Laundering Regulations In order to comply with laws, rules and regulations applicable to banking institutions, including those relating to the funding of terrorist activities and money laundering, the Indenture Trustee is required to obtain, verify and record certain information relating to individuals and entities which maintain a business relationship with the Indenture Trustee. Accordingly, each of the parties hereto agrees to provide to the Indenture Trustee upon its request from time to time such identifying information and documentation as may be available for such party in order to enable the Indenture Trustee to comply with applicable law.
Anti-Corruption Laws, Anti-Money Laundering Laws and Sanctions (i) None of (i) the Borrower, any other Loan Party, any Subsidiary, any of their respective directors, officers, employees or, to the knowledge of the Borrower, any Affiliates, or (ii) to the knowledge of the Borrower, any agent or representative of the Borrower or any Subsidiary that will act in any capacity in connection with or benefit from this Agreement, (A) is a Sanctioned Person or currently the subject or target of any Sanctions, (B) is controlled by or is acting on behalf of a Sanctioned Person, (C) has its assets located in a Sanctioned Country, (D) is under administrative, civil or criminal investigation for an alleged violation of, or received notice from or made a voluntary disclosure to any governmental entity regarding a possible violation of, Anti-Corruption Laws, Anti-Money Laundering Laws or Sanctions by a governmental authority that enforces Sanctions or any Anti-Corruption Laws or Anti-Money Laundering Laws, or (E) directly or indirectly derives revenues from investments in, or transactions with, Sanctioned Persons. (ii) Each of the Borrower and its Subsidiaries has implemented and maintains in effect policies and procedures designed to ensure compliance by the Borrower and its Subsidiaries and their respective directors, officers, employees, agents and, to the knowledge of the Borrower, any Affiliates with all Anti-Corruption Laws, Anti-Money Laundering Laws and applicable Sanctions. (iii) Each of the Borrower and its Subsidiaries, each director, officer, employee, agent and, to the knowledge of the Borrower, any Affiliate of Borrower and each such Subsidiary, is in compliance with all Anti-Corruption Laws, Anti-Money Laundering Laws in all respects and applicable Sanctions. (iv) No proceeds of any Loans have been used, directly or indirectly, by the Borrower, any of its Subsidiaries or any of its or their respective directors, officers, employees and agents in violation of Section 9.11(b).
Rights Protection Mechanisms and Abuse Mitigation ‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.
Anti-Money Laundering Compliance Programs Soliciting Dealer represents to the Dealer Manager and to the Company that it has established and implemented anti-money laundering compliance programs in accordance with applicable law, including applicable FINRA Conduct Rules, the Exchange Act Rules and Regulations and the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, as amended (the “USA PATRIOT Act”), specifically including, but not limited to, Section 352 of the International Money Laundering Abatement and Anti-Terrorist Financing Act of 2001 (the “Money Laundering Abatement Act,” and together with the USA PATRIOT Act, the “AML Rules”) reasonably expected to detect and cause the reporting of suspicious transactions in connection with the offering and sale of the Shares. Soliciting Dealer further represents that it currently is in compliance with all AML Rules, specifically including, but not limited to, the Customer Identification Program requirements under Section 326 of the Money Laundering Abatement Act, and Soliciting Dealer hereby covenants to remain in compliance with such requirements and shall, upon request by the Dealer Manager or the Company, provide a certification to the Dealer Manager or the Company that, as of the date of such certification (a) its AML Program is consistent with the AML Rules, and (b) it is currently in compliance with all AML Rules, specifically including, but not limited to, the Customer Identification Program requirements under Section 326 of the Money Laundering Abatement Act. Upon request by the Dealer Manager at any time, Soliciting Dealer will (i) furnish a written copy of its AML Program to the Dealer Manager for review, and (ii) furnish a copy of the findings and any remedial actions taken in connection with its most recent independent testing of its AML Program.
Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.
Anti-Corruption Laws; Sanctions Conduct its business in compliance in all material respects with the United States Foreign Corrupt Practices Act of 1977, the UK Bribery Act 2010 and other applicable anti-corruption legislation in other jurisdictions and with all applicable Sanctions, and maintain policies and procedures designed to promote and achieve compliance with such laws and Sanctions.
Sanctions; Anti-Corruption Laws The Borrower will maintain in effect policies and procedures designed to promote compliance by the Borrower, its Subsidiaries, and their respective directors, officers, employees, and agents with applicable Sanctions and with the FCPA and any other applicable anti-corruption laws.
Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and its respective Subsidiaries may presently have and, after the Effective Time, may gain access to or possession of confidential or proprietary Information of, or personal Information relating to, Third Parties: (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or the other Party’s Subsidiaries, on the other hand, prior to the Effective Time or (ii) that, as between the two parties, was originally collected by the other Party or the other Party’s Subsidiaries and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause its Subsidiaries and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary Information of, or personal Information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or the other Party’s Subsidiaries, on the one hand, and such Third Parties, on the other hand.