Company Compliance Policies Sample Clauses

Company Compliance Policies. Most of the Enterprise compliance policies covering the matters discussed below are recorded in written documents generally applicable to all employees and may be obtained from your Human Resources representative. Others are adapted specifically to certain work areas or to employees dealing in the areas covered by the policy. It is the responsibility of every employee to conduct his or her job in strict compliance with such policies. Questions concerning all policies may be addressed to your immediate supervisor, your Human Resources representative or the Enterprise Law Department. Enterprise also conducts ongoing educational programs and training on certain compliance issues for employees. Because written policies and training programs cannot anticipate every possible factual situation, each employee has an obligation to seek clarification and advice whenever a question concerning compliance with our Code of Conduct arises. 1. Antitrust Laws Enterprise's Antitrust Compliance Policy and Antitrust Compliance Guide set forth Enterprise's intention to conduct operations in strict compliance with all applicable antitrust laws. The antitrust laws generally prohibit business activities that constitute unreasonable restraints of trade. This policy discusses the Xxxxxxx Act's prohibition against horizontal conduct between competitors, such a price fixing agreements. Also discussed in the policy statement are the severe criminal and civil penalties, both corporate and individual, for violations of the antitrust laws. Recommendations for avoiding inadvertent violations, including guidelines for discussions of business activities, are also included. 2. Boycott Laws Federal law prohibits persons from taking or agreeing to take certain actions in connection with any unsanctioned foreign boycott directed against any country friendly to the United States. Enterprise's Compliance with the Foreign Boycotts Title of the Export Administration Act details compliance issues and reporting requirements.
AutoNDA by SimpleDocs

Related to Company Compliance Policies

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Privacy Compliance The Provider shall comply with all applicable federal, state, and local laws, rules, and regulations pertaining to Student Data privacy and security, all as may be amended from time to time.

  • PCI Compliance A. The Acquiring Bank will provide The Merchant with appropriate training on PCI PED and/or DSS rules and regulations in respect of The Merchants obligations. Initial training will be provided and at appropriate intervals as and when relevant changes are made to such rules and regulations. B. The Acquiring Bank will ensure that The Merchant is kept informed of any relevant new, or changes to, PCI PED and/or DSS compliance rules and regulations. C. The Merchant will comply with PCI PED and/or DSS, and resulting obligations, in respect of establishing, and maintaining, the required security controls. D. The Merchant will ensure that all its appropriate staff (existing and new) are knowledgeable in their responsibilities with respect to PCI PED and/or DSS compliance. E. The Merchant must be able to demonstrate compliance with PCI PED and/or DSS and maintain measures necessary to successfully pass regular compliance certification checks. F. The Merchant will notify The Acquiring Bank immediately should it become evident that data security standards have been compromised. The Merchant will also provide all assistance necessary to assist The Acquiring Bank and its agents to investigate and obtain any required evidence of a security breach. G. The Merchant hereby agrees and undertakes to fully indemnify The Acquiring Bank from and against all actions, claims, losses, charges, costs and damages which The Acquiring Bank may suffer or incur as a result of The Merchants failure to comply with PCI PED and/or DSS. H. Further to the conditions set out in Section 34 below, The Acquiring Bank reserves the right to terminate this agreement with The Merchant if The Merchant: i. Refuses to accept, or commence, any remedial action(s) required under its obligation to PCI PED and/or DSS. ii. Fails to maintain its PCI PED and/or DSS obligations and/or consistently fails compliance certification checks. iii. Receives continuing penalties Fraud notifications or alerts of in any case where the Acquiring bank may be asked by the schemes to take action against the Merchant. اهيلع ةقداصملا تمت دق هنأ نم ةيلمع يأ ذيفنت دعب دكأتلا رجاتلا ىلع بجي .10 لمحتب هرارقإ متو ةقاطبلا لماح ةطساوب بولطملا وحنلا ىلعو ةرشابم .ةيلمعلا كلت ذيفنت نع هتيلوؤسم لماك يأ تحت ةيلمع نم رثكأ ىلإ ةيلمعلا ةميق ميسقتب موقي لاأب رجاتلا دهعتي .11 لاير )500( ةميقب نيتيلمع ذفني نأ لاثملا ليبس ىلعف ،قلاطلإا ىلع فرظ ةعباتلا عفدلا ةقاطب سفن مادختساب لاير )1000( يلامجلإا اهغلبم عئاضبل اذه ربتعي ثيحب ؛ىرخأ عفد تاقاطب ةيأ وأ تاعوفدملل ةيدوعسلا ةكبشلل ءاغلإ و زاهجلا فاقيا ةلاحلا هذه يف كنبلل قحيو ،اًمامت ًاروظحم فرصتلا .ةيقافتلاا ةكبشلا ةقاطبب لقأ وأ رثكأ وأ لايرب ةرركم تايلمع ءارجإ رجاتلل قحي لا .12 غلابم وأ تايلمع ددع قيقحت ضرغب هب ةصاخلا نامتئلاا ةقاطب وأ ةيدوعسلا ءاغلإ و زاهجلا فاقيا كنبلل قحيو .هيلع ةررقملا موسرلا عفد بنجتل تايلمع .رجاتلا باسح نم ةررقملا موسرلا مصخ يف قحلاب ظافتحلاا عم ةيقافتلاا لمحُي نل هلاعأ ةحضوملا تامازتللااو تاءارجلإاب ديقتلا مدعو هقافخإ نأ رجاتلا رقي وأ فيلاكت وأ تابلاطم وأ ىوعد ةيأ نع اهريغ وأ تناك ةينوناق ،ةيلوؤسم ةيأ كنبلا ةراسخ وأ ةيمكارتلا رارضلأا وأ رئاسخلا كلذ يف امب رئاسخ وأ رارضأ وأ فيراصم مازتللااب رجاتلا للاخإ ببسب رجاتلا كنب اهدبكتي وأ اهل ضرعتي دق يتلا ،حابرلأا مدع ببسب ركذ امم يلأ رجاتلا كنب ضرعت لاح يفو .ةدراولا تابلطتملاو تاميلعتلاب ىوعد نم هيلع بترتي دق ام عيمج رجاتلا لمحتي ،ةروكذملا تاءارجلإاب رجاتلا مازتلا مدع ةجيتن رجاتلا كنب قحلت دق رئاسخ وأ رارضأ وأ فيراصم وأ فيلاكت وأ تابلاطم وأ .تاءارجلإاو طورشلاو تابلطتملا هذهب رجاتلا مازتلا عفدلا تاقاطب ةعانص رايعم عم قفاوتلا .9 PCI Compliance مادختساب ةصاخلا دعاوقلا ىلع بسانملا بيردتلا رجاتلل رجاتلا كنب مدقي .أ ،عفدلا تاقاطب ةعانصب قلعتت يتلاو ةيرسلا ةيصخشلا ماقرلأا لاخدإ زاهج تامازتلاب قلعتي اميف عفدلا تاقاطب ةعانص تانايب ةيامح رايعم ىلع اًضيأو تارييغت يأ ىلع وأ ديدج وه ام ىلع رجاتلا علاطإ ماود نم رجاتلا كنب دكأتي .ب ماقرلأا لاخدإ زاهج مادختساب ةصاخلا مازتللاا دعاوقو تاعيرشتلاب ةقلاع تاذ تانايب ةيامح رايعمب وأ ،عفدلا تاقاطبب قلعتي ام لك وأ ةيرسلا ةيصخشلا .عفدلا تاقاطب ةعانص ،عفدلا تاقاطبل ةيرسلا ةيصخشلا ماقرلأا لاخدإ ئدابمو ريياعمب رجاتلا مزتلي .ج قلعتي اميف ةرداصلا اهتاعيرشتو ،عفدلا تاقاطب تانايب نمأ ريياعمب اًضيأو .ةبولطملا ةيامحلا طباوض قيبطتو سيسأتب )نيدجتسملاو نييلاحلا( نيصتخملا نيفظوملا علاطإ نم رجاتلا دكأتي .د ةيصخشلا ماقرلأا لاخدإب ةصاخلا مازتللاا دعاوقب قلعتي اميف مهتايلوؤسمب .عفدلا تاقاطب تانايب نمأ ريياعمو ،عفدلا تاقاطبل ةيرسلا ةيصخشلا ماقرلأا لاخدإب ةصاخلا مازتللاا دعاوق حضوي نأ رجاتلا ىلع بجي .ـه ةظفاحملاو ،عفدلا تاقاطب تانايب نمأ ريياعم كلذكو عفدلا تاقاطبل ةيرسلا مازتللاا ىدمل ةيرودلا تارابتخلاا ةداهش زايتجلا ةيرورضلا ريياعملا ىلع .حاجنب ريياعم كاهتنا نم ققحتلا روف رجاتلا كنب راعشإب رجاتلا موقي نأ بجي .و كنب ةدعاسمل يرورض وه ام لك ميدقت رجاتلا ىلع بجي اًضيأو ،ةيامحلا ةبولطملا نيهاربلاو ةلدلأا يف قيقحتلا نم نيصتخملا هيفظومو رجاتلا .ةيامحلا قارتخا تابثلإ رجاتلا كنبل ةلماكلا ةيامحلاب ةيقافتلاا هذه بجومب رجاتلا مزتليو دهعتي .ز تابلاطم وأ ىوعد ةيأ نع ،اهريغ وأ تناك ةينوناق ،ةيلوؤسم ةيأ هليمحت مدعو رارضلأا وأ رئاسخلا كلذ يف امب رئاسخ وأ رارضأ وأ فيراصم وأ فيلاكت وأ ببسب رجاتلا كنب اهدبكتي وأ اهل ضرعتي دق يتلا ،حابرلأا ةراسخ وأ ةيمكارتلا كنب ظفتحي ،هاندأ 34 مقر ةداملا يف اهعضو مت يتلا طورشلا ىلإ ةفاضإ .ح :يتلآاب رجاتلا مايق ةلاح يف رجاتلا عم ةيقافتلاا هذه ءاهنإ قحب رجاتلا هتامازتلا هيلع هيلمت بولطم يزارتحا ءارجإ يأ ذاختا وأ لوبق هضفر .i وأ عفدلا تاقاطبل ةيرسلا ةيصخشلا ماقرلأا لاخدإ ئدابمو ريياعمب .عفدلا تاقاطب تانايب نمأ ريياعمب ماقرلأا لاخدإ ئدابمو ريياعمو دعاوقب مازتللااو ةظفاحملا يف هقافخإ .ii ،عفدلا تاقاطب تانايب نمأ ريياعمب وأ عفدلا تاقاطبل ةيرسلا ةيصخشلا .مازتللاا تارابتخا زايتجا يف لشفلا و/وأ تاريذحتلاو تاهيبنتلا هملاتسا وأ هيلع ةرمتسملا تامارغلا ضرف .iii تاعوفدملا ماظن لبق نم ةيلمع يأ صوصخب ريوزتلاب ةقلعتملا مزلالا ءارجلإا ذاختا رجاتلا كنب نم بلطي دق اهللاخ نم يتلاو ،يملاعلا 10. Transaction(s) to be in Saudi Riyals: All MADA-POS transactions must be denominated in Saudi Riyals (SR).

  • Compliance; Permits All activity undertaken pursuant to this Contract shall be in compliance with federal and state law and regulations and City Requirements. Developer shall obtain all permits and approvals required to do the work authorized under this Contract.

  • FCPA Compliance The Company has not and, to the best of the Company’s knowledge, none of its employees or agents at any time during the last five years have (i) made any unlawful contribution to any candidate for foreign office, or failed to disclose fully any contribution in violation of law, or (ii) made any payment to any federal or state governmental officer or official, or other person charged with similar public or quasi-public duties, other than payments required or permitted by the laws of the United States or any jurisdiction thereof.

  • Permits and Compliance Section 2.9

  • OSHA Compliance To the extent applicable to the services to be performed under this Agreement, Contractor represents and warrants, that all articles and services furnished under this Agreement meet or exceed the safety standards established and promulgated under the Federal Occupational Safety and Health Law (Public Law 91-596) and its regulations in effect or proposed as of the date of this Agreement.

  • Compliance Reports The Subadvisor at its expense will provide the Advisor with such compliance reports relating to its duties under this Agreement as may be agreed upon by such parties from time to time.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!