Reporting and Recordkeeping The ownership of the property whether securities, cash and/or other property, and whether held by the Custodian or a subcustodian or in a depository, clearing agency or clearing system, shall be clearly recorded on the Custodian's books as belonging to the Series and not for the Custodian's own interest. Where certificates are legended or otherwise not fungible with publicly traded certificates (and in other cases where the Custodian and the Series may agree), the Series reserves the right to instruct the Custodian as to the name only in which such securities shall be registered and the Custodian, to the extent reasonably practicable, shall comply with such Instructions; provided, however, if the Custodian reasonably determines that compliance with such Instructions is not reasonably practicable or otherwise may conflict with applicable law, rule or regulation, the Custodian shall promptly notify the Series and shall comply with reasonable alternatives as to which the parties may agree. The Custodian shall keep accurate and detailed accounts of all investments, receipts, disbursements and other transactions for the Series. All accounts, books and records of the Custodian relating thereto shall be open to inspection and audit at all reasonable times during normal business hours of the Custodian by any person designated by the Series. All such books, records and accounts shall be maintained and preserved in the form reasonably requested by the Series and in accordance with the Act and the Rules and Regulations thereunder, including, without limitation, Section 31 thereof and Rule 31a-1 and 31a-2 thereunder. All books, records and accounts pertaining to the Series, which are in the possession of the Custodian, shall be the property of the Fund and such materials or (unless the delivery of original materials is required pursuant to applicable law) legible copies thereof in a format reasonably acceptable to the Fund, shall be surrendered promptly upon request; provided, however, that the Custodian shall be entitled to retain a copy or the original of any such books, records and accounts as may be required or permitted by applicable law and the Custodian's own policies and procedures. The Custodian will supply to the Series from time to time, as mutually agreed upon, a statement in respect to any property of the Series held by the Custodian or by a subcustodian.
Reporting and Record Keeping CONTRACTOR shall comply with all program and fiscal reporting requirements set forth by appropriate Federal, State and local agencies, and as required by the COUNTY. (c) CONTRACTOR agrees to provide to COUNTY, to any Federal or State department having monitoring or review authority, to COUNTY's authorized representatives, and/or their appropriate audit agencies upon reasonable notice, access to and the right to examine all records and documents necessary to determine compliance with relevant Federal, State, and local statutes, rules and regulations, and this Agreement, and to evaluate the quality, appropriateness and timeliness of services performed.
Recordkeeping Requirements COLLEGE and SCHOOL DISTRICT shall comply with the requirements governing maintenance of records of each request for access to and each disclosure of, student education records set forth under Title 34, Code of Federal Regulations § 99.32 and under Education Code § 49064 as applicable.
Compliance with Record Keeping Requirements Participating Dealer agrees to comply with the record keeping requirements of the Exchange Act, including but not limited to, Rules 17a-3 and 17a-4 promulgated under the Exchange Act. Participating Dealer further agrees to keep such records with respect to each customer who purchases Primary Shares, his suitability and the amount of Primary Shares sold, and to retain such records for such period of time as may be required by the Commission, any state securities commission, FINRA or the Company.
Reporting Requirements The Company, during the period when the Prospectus is required to be delivered under the 1933 Act or the 1934 Act, will file all documents required to be filed with the Commission pursuant to the 1934 Act within the time periods required by the 1934 Act and the 1934 Act Regulations.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Record Keeping Requirements The Training Provider must make and keep accurate Records for all Training Services in sufficient detail to allow the Department to determine compliance with this Contract (including the accuracy of claims for payment of the Funds).
Recordkeeping and Reporting The Subadvisor shall maintain the records and information required by Rule 31a-1 under the 1940 Act described in Schedule B attached hereto, with respect to the Assets of the Series. In addition, the Subadvisor shall maintain such other records relating to the services the Subadvisor provides under this Agreement as may be required in the future by applicable SEC and other applicable rules, and shall retain such information for such times and in such manner as required by applicable rules, including but not limited to Rule 31a-2 under the 1940 Act. The records maintained by the Subadvisor hereunder shall be the property of the Fund and shall be surrendered promptly upon request; subject, however, to the Subadvisor's right to retain all such records as the Subadvisor is required to maintain under the Advisers Act and the rules and regulations promulgated thereunder; provided, further, that the Fund shall be entitled to make and maintain copies of any records so retained by request.
Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. B. Grantee shall use the Texas Abuse Hotline Website located at xxxxx://xxx.xxxxxxxxxxxxxx.xxx/Login/Default.aspx as required by the System Agency. Grantee shall retain reporting documentation on site and make it available for inspection by the System Agency.
Reporting Requirement (1) In the event the Contractor identifies covered telecommunications equipment or services used as a substantial or essential component of any system, or as critical technology as part of any system, during contract performance, or the Contractor is notified of such by a subcontractor at any tier or by any other source, the Contractor shall report the information in paragraph (d)(2) of this clause to the Contracting Officer, unless elsewhere in this contract are established procedures for reporting the information; in the case of the Department of Defense, the Contractor shall report to the website at xxxxx://xxxxxx.xxx.xxx. For indefinite delivery contracts, the Contractor shall report to the Contracting Officer for the indefinite delivery contract and the Contracting Officer(s) for any affected order or, in the case of the Department of Defense, identify both the indefinite delivery contract and any affected orders in the report provided at xxxxx://xxxxxx.xxx.xxx. (2) The Contractor shall report the following information pursuant to paragraph (d)(1) of this clause (i) Within one business day from the date of such identification or notification: the contract number; the order number(s), if applicable; supplier name; supplier unique entity identifier (if known); supplier Commercial and Government Entity (CAGE) code (if known); brand; model number (original equipment manufacturer number, manufacturer part number, or wholesaler number); item description; and any readily available information about mitigation actions undertaken or recommended. (ii) Within 10 business days of submitting the information in paragraph (d)(2)(i) of this clause: any further available information about mitigation actions undertaken or recommended. In addition, the Contractor shall describe the efforts it undertook to prevent use or submission of covered telecommunications equipment or services, and any additional efforts that will be incorporated to prevent future use or submission of covered telecommunications equipment or services.