Regulatory Activities Beginning on the Effective Date and to the extent UGNX remains the Lead Development Party with respect to a particular territory, subject to and in accordance with the terms and conditions of this Agreement and the requirements of Applicable Laws, UGNX, shall: (a) use Commercially Reasonable Efforts to file (or have filed) all Regulatory Filings with respect to the Licensed Products in the Field in order to obtain Marketing Approvals in each country in the Territory and the European Territory (or to obtain the European Centralized Approval in the European Core Territory) and in order to obtain Pricing and/or Reimbursement Approvals in the Profit Share Territory; (b) respond in a timely fashion to requests for data and information from Regulatory Authorities with respect to the Licensed Products in the Field in the Territory and the European Territory; and (c) meet with officials of the Regulatory Authorities at such times as may be requested by such Regulatory Authorities with respect to the Core Development Activities (“Regulatory Activities”), provided that KHK will have primary responsibility for obtaining, and UGNX shall provide all assistance reasonably requested by KHK, in relation to Pricing and/or Reimbursement Approvals for the Licensed Products in the Field in the European Territory. For the avoidance of doubt, UGNX will be responsible for obtaining, and KHK will provide all assistance reasonably requested by UGNX, in relation to Pricing and/or Reimbursement Approvals, if any, for the Licensed Products in the Field in the Profit Share Territory as part of the UGNX Core Development Activities, it being understood that the costs incurred by UGNX in connection with such activities will be shared equally (50/50). All such Regulatory Activities will be conducted in a manner consistent with the Core Development Plan and coordinated by the JSC in accordance with Article 3. Without limiting the applicability of the foregoing and the remainder of this Article 5, UGNX shall interface with the applicable Regulatory Authority(ies) and, through the JDC, shall keep KHK reasonably informed of all material events and developments occurring in the course of the Regulatory Activities, including scheduled UGNX regulatory strategy discussions and meetings with Regulatory Authorities in the Territory and the European Territory relating to the Licensed Products in the Field.
Securities Activities A. Neither Company nor any of its Subsidiaries is engaged principally, or as one of its important activities, in the business of extending credit for the purpose of purchasing or carrying any Margin Stock. B. Following application of the proceeds of each Loan, not more than 25% of the value of the assets (either of Company only or of Company and its Subsidiaries on a consolidated basis) subject to the provisions of subsection 7.2 or 7.7 or subject to any restriction contained in any agreement or instrument, between Company and any Lender or any Affiliate of any Lender, relating to Indebtedness and within the scope of subsection 8.2, will be Margin Stock.
Student Responsibilities The school provided Chromebook for the student is an important learning tool to be used for educational purposes. In order to use the device each day, the student must be willing to accept the following responsibilities: ● I understand that district officials have the ability to monitor my use of the device AT ALL TIMES IN AND OUT OF SCHOOL and that communications, files, internet search activities, and any other actions using the device are not considered to be private. Note: RCCSD does not have the ability to and will not remotely operate the camera on the device. However, students can cover it when not in use to ensure others are not. ● I understand that the device assigned to me is on loan from Red Clay Consolidated School District. All accounts, programs, and files are subject to inspection at any time without notice. ● I will be responsible for ALL damage or loss of the device due to NEGLECT OR ABUSE including dropping it, getting it wet, and spills of food or drink. ● I will not try to repair my Chromebook. ● At ALL times when using my Chromebook, I will follow the Acceptable Use, Internet Safety Policy, and Student Code of Conduct, and related policies adopted by the Board of Education, and abide by all local, state, and federal laws. ● I will talk with my parent/guardian about their ground rules for going online when not at school. ● I will notify the school principal and my parents of any damage to the device as soon as possible. ● I will charge the Chromebook battery each night and will bring my Chromebook to school every day or be prepared for remote learning. ● I will keep my Chromebook clean. ● I will not lend my device to anyone. This includes family members and friends. Note: I could be held responsible for any inappropriate content on the District issued Chromebook. ● I will keep all passwords assigned to me secure. ● I will only use my account credentials to sign into my Chromebook. ● I am allowed to connect to non-district printers and wireless networks at home and in public places. ● I agree that e-mail or any other computer communication should be used only for appropriate, legitimate, and responsible communication. ● I agree not to share personal information about myself (full name, address, etc.) or about my family, friends or anyone else. ● I agree not to search for, download, display, post, or distribute vulgar, offensive material or images described in applicable district policies. (See the student handbook and/or the district's Acceptable Use Agreement.) ● I agree to abide by all school rules that address electronic device procedures. ● I will return the device when requested, at the end of the school year or upon my withdrawal. ● I agree to not deface or destroy this property in any way. Inappropriate use of the machine may result in the student losing their right to use the Chromebook. ● I understand that identification labels have been placed on the Chromebook. These labels are not to be removed or modified. Additional stickers, labels, tags, or markings of any kind are NOT to be added to the machine.
Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.
Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.
Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.
Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:
Community Engagement Integration Activities The SP will support the HSP to engage the community of diverse persons and entities in the area where it provides health services when setting priorities for the delivery of health services and when developing plans for submission to the LHIN including but not limited to CAPS and integration proposals.
Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will:
Transition Planning The AGENCY will be responsible for the development of the student’s Transition Plan, which begins upon entry and is completed prior to the student’s exit.