Compliance Mechanisms Sample Clauses

Compliance Mechanisms. The Licensed Program(s) may contain technological copy protection or other security features designed to prevent unauthorized use of the Licensed Program(s), including features to protect against use of the Licensed Program(s): (a) beyond the scope of the license granted to pursuant to Section 2.1; or (b) prohibited in Section 2.3. Licensee shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.
Compliance Mechanisms. CCH eLending may contain technological copy protection or other security features designed to prevent unauthorised use of CCH eLending or materials accessible via CCH eLending, including features designed to protect against use of CCH eLending: (a) beyond the scope of the licence granted pursuant to clause 2.1; or (b) prohibited in clause 2.6. The Customer must not, and must not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.
Compliance Mechanisms. The Product(s) may contain technological copy protection or other security features designed to prevent unauthorized use of the Products, including features to protect against use of the Product(s): (a) beyond the scope of the license granted to pursuant to subsection 2.1; or (b) prohibited in subsection 2.3. Customer shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.
Compliance Mechanisms. Compliance with this Agreement will be ensured through ongoing communications among the Parties to this Agreement, periodic reporting of air tour operations by Charm City Aviation LLC as described in 5.4 of this Section, and enforcement measures if necessary. The Parties agree to work together to address any possible compliance issues.
Compliance Mechanisms. The Application may contain technological copy protection or other security features designed to prevent unauthorized use of the Application, including features to protect against use of the Application: (a) beyond the scope of the license granted to pursuant to subsection 2.1; or (b) prohibited in subsection 2.2. Customer shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.
Compliance Mechanisms. The Hosted Application may contain technological copy protection or other security features designed to prevent unauthorized use of the Hosted Application, including features to protect against use of the Hosted Application: (a) beyond the scope of the license granted to pursuant to subsection 2.1; or (b) prohibited in subsection 2.2. Customer shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features. Unauthorized Acquisition. CCH SFS expressly prohibits the use of any product or service from CCH SFS that has been improperly obtained and/or accessed. For purposes of illustration, but not limitation, examples include any product or service that: (a) is acquired from an unauthorized reseller or distributor; (b) is pirated, cracked or hacked, including through the use of Online Account Access Information established for use by another individual; (c) has been acquired with the intent or for the purpose to use in a manner that is illegal, fraudulent, in violation of this Agreement or otherwise outside the normal, stated and/or reasonably understood purpose of such product or service; or (d) is acquired with the use of false or inaccurate statements and/or information (e.g., false name, contact information, or payment information; or false declaration of the total number of end users).
Compliance Mechanisms. Enforcement of a company’s code of conduct is critical. Compliance officers should be accessible so that employees will feel comfortable discussing any of their compliance questions or concerns. • Creating reporting mechanisms with adequate policies on confidentiality and non- retaliation as well as other safeguards related to reporting is extremely important. • Whistleblowing protections, suggestion boxes, or “Help-lines” facilitate detection and reporting of questionable conduct. • Companies should provide guidance to assist employees and agents on how to cope with and resolve difficult situations. Such counseling not only protects the person in the field, it also protects the company.
Compliance Mechanisms. The Hosted Application may contain technological copy protection or other security features designed to prevent unauthorized use of the Hosted Application, including features to protect against use of the Hosted Application: (a) beyond the scope of the license granted to pursuant to subsection 2.1; or (b) prohibited in subsection 2.2. Customer shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.

Related to Compliance Mechanisms

  • Compliance Audit LEA shall have the right but shall be under no obligation to conduct audit(s), from time to time, of Provider’s records concerning its compliance obligations as set forth in this Article V. Provider shall make such records and other documents available to LEA upon request.

  • Compliance Audits D. 4.1 Compliance Audit(s). Without limiting the generality of section A.7.4 (Records Review), if requested by the Province from time to time, which request shall be at the Province’s sole discretion, the Recipient, at its own expense, will forthwith retain an independent third party auditor to conduct one or more compliance audits of the Recipient or any Project. The audit will be conducted in accordance with Canadian Generally Accepted Auditing Standards, as adopted by the Canadian Institute of Chartered Accountants, applicable as of the date on which a record is kept or required to be kept under such standards. In addition, the audit will assess the Recipient’s compliance with the terms of the Agreement and will address, with respect to each Project, without limitation, the following: (a) whether the Funds were spent in accordance with the Agreement and with due regard to economy, efficiency, and effectiveness; (b) the Project’s progress or state of completion; (c) whether the financial information the Recipient provided is complete, accurate, and timely, and in accordance with the Agreement; (d) whether the Recipient’s information and monitoring processes and systems are adequate to identify, capture, validate, and monitor the achievement of intended benefits of the Project; (e) the overall management and administration of the Project; (f) recommendations for improvement or redress; and (g) whether prompt and timely corrective action is taken on prior audit findings.

  • Forecasting Requirements 19.5.1 The Parties shall exchange technical descriptions and forecasts of their Interconnection and traffic requirements in sufficient detail necessary to establish the Interconnections necessary for traffic completion to and from all Customers in their respective designated service areas.

  • Compliance Monitoring Grantee must be subject to compliance monitoring during the period of performance in which funds are Expended and up to three years following the closeout of all funds. In order to assure that the program can be adequately monitored, the following is required of Grantee: a. Grantee must maintain a financial tracking system provided by Florida Housing that ensures that CRF funds are Expended in accordance with the requirements in this Agreement. b. Grantee must maintain records on all awards to Eligible Persons or Households. These records must include, but are not limited to: i. Proof of income compliance (documentation from submission month, including but not limited to paystub, Florida unemployment statement, social security and/or disability statement, etc.); ii. Lease; and iii. Documentation of rental assistance payments made.

  • Compliance Requirements A. Nondiscrimination. The Contractor agrees to comply, and to require its subcontractor(s) to comply, with the nondiscrimination provisions of MCL 37.2209. The Contractor further agrees to comply with the provisions of Section 9:158 of Chapter 112 of the Xxx Arbor City Code and to assure that applicants are employed and that employees are treated during employment in a manner which provides equal employment opportunity.

  • Testing Requirements 12.1. Workplaces - 12.2. On workplaces where the value of the Commonwealth’s contribution to the project that includes the building work is at least $5,000,000, and represents at least 50% of the total construction project value or the Commonwealth’s contribution to the project that includes the building work is at least $10,000,000 (irrespective of its proportion of the total construction project value) the following minimum testing requirements must be adhered to.

  • Compliance Plan (1) This paragraph (h) applies to any portion of the contract that— (i) Is for supplies, other than commercially available off-the-shelf items, acquired outside the United States, or services to be performed outside the United States; and (ii) Has an estimated value that exceeds $500,000. (2) The Contractor shall maintain a compliance plan during the performance of the contract that is appropriate— (i) To the size and complexity of the contract; and (ii) To the nature and scope of the activities to be performed for the Government, including the number of non- United States citizens expected to be employed and the risk that the contract or subcontract will involve services or supplies susceptible to trafficking in persons.

  • Compliance Matters (a) The Sub-Adviser understands and agrees that it is a “service provider” to the Trust as contemplated by Rule 38a-1 under the 1940 Act. As such, the Sub-Adviser agrees to cooperate fully with the Adviser and the Trust and its Trustees and officers, including the Fund’s CCO, with respect to (i) any and all compliance-related matters, and (ii) the Trust’s efforts to assure that each of its service providers adopts and maintains policies and procedures that are reasonably designed to prevent violation of the “federal securities laws” (as that term is defined by Rule 38a-1) by the Trust, the Adviser and the Sub-Adviser. In this regard, the Sub-Adviser shall: (1) submit to the Board for its consideration and approval, prior to the effective date of this Agreement, the Sub-Adviser’s compliance program, it being understood that the Sub-Adviser’s obligation under Section 2(e) of this Agreement to vote all proxies solicited by or with respect to the issuers of securities in which the assets of the Portfolio may be invested shall be subject to the fulfillment of the condition that the Board approve the Sub-Adviser’s proxy voting policies and procedures; (2) submit annually (and at such other times as the Trust may reasonably request) to the Fund’s CCO and the Adviser for consideration by the Board, a report discussing the adequacy and effectiveness of the Sub-Adviser’s compliance program, and fully describing any material amendments to such compliance program since the most recent such report; (3) provide periodic reports, certifications and information concerning the Sub-Adviser’s compliance program including, but not limited to, the following; (i) Quarterly Compliance Certifications, including any required attachments, no later than the tenth (10th) business day after each calendar quarter; and (ii) Annual Report on Code of Ethics Matters, including any required attachments, no later than the fifteenth (15th) business day of October each year. (4) provide the Adviser and the Trust and its Trustees and officers with reasonable access to information regarding the Sub-Adviser’s compliance program, which access shall include on-site visits with the Sub-Adviser as may be reasonably requested from time to time; (5) permit the Adviser and the Trust and its Trustees and officers to maintain an active working relationship with the Sub-Adviser’s compliance personnel by, among other things, providing the Adviser and the Fund’s CCO and other officers with a specified individual within the Sub-Adviser’s organization to discuss and address compliance-related matters; (6) provide the Adviser and its chief compliance officer and the Trust and its Trustees and officers, including the Fund’s CCO, with such certifications as may be reasonably requested; and (7) reasonably cooperate with any independent registered public accounting firm engaged by the Trust, ensure that all reasonably necessary information and the appropriate personnel are made available to such independent registered public accounting firm, to support the expression of the independent registered public accounting firm’s opinion, and each year provide the Adviser and such independent registered public accounting firm with a copy of the most recent SSAE 16 Report prepared by the Sub-Adviser’s independent auditors regarding the Sub-Adviser’s internal controls. (b) The Sub-Adviser represents, warrants and covenants that it has implemented and shall maintain a compliance program in accordance with the requirements of Rule 206(4)-7 under the Advisers Act.

  • Compliance Reporting a. Provide reports to the Securities and Exchange Commission, the National Association of Securities Dealers and the States in which the Fund is registered. b. Prepare and distribute appropriate Internal Revenue Service forms for corresponding Fund and shareholder income and capital gains. c. Issue tax withholding reports to the Internal Revenue Service.

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. B. Grantee shall use the Texas Abuse Hotline Website located at xxxxx://xxx.xxxxxxxxxxxxxx.xxx/Login/Default.aspx as required by the System Agency. Grantee shall retain reporting documentation on site and make it available for inspection by the System Agency.