Compliance with ISACA’s Policies and Procedures Sample Clauses

Compliance with ISACA’s Policies and Procedures. Chapter acknowledges and agrees that: i. Each chapter leader has been provided with access to the Chapter Information Repository and prior to the entering into of this Agreement it reviewed and is familiarized with ISACA’s Policies and Procedures published therein, which are incorporated herein by reference. ii. ISACA shall be entitled to modify and update ISACA’s Policies and Procedures from time-to-time, including to address new issues or to reflect changes in ISACA’s practices or in the applicable law. ISACA will notify the Chapter of material changes to ISACA’s Policies and Procedures by posting the changes or most recent version of the corresponding provisions of ISACA’s Policies and Procedures in ISACA’s Chapter Information Repository and/or by sending an informative email communication to then-current President of the Chapter, together with information about the changes from the previous version; in the understanding that Chapter shall be obliged to comply with the revised version of ISACA’s Policies and Procedures as of the date in which it is posted in ISACA’s Chapter Information Repository, and to the extent permissible under the law applicable in the Territory.
AutoNDA by SimpleDocs

Related to Compliance with ISACA’s Policies and Procedures

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance with Policies Each Individual Limited Partner hereby agrees that he shall comply with all policies and procedures adopted by any member of the Och-Ziff Group or which Limited Partners are required to observe by law, or by any recognized stock exchange, or other regulatory body or authority.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-­‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).

  • Compliance with Rules and Policies The Executive shall perform all services in accordance with the lawful policies, procedures and rules established by the Company and the Board. In addition, the Executive shall comply with all laws, rules and regulations that are generally applicable to the Company or its subsidiaries and their respective employees, directors and officers.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Compliance with FINRA Rules The Company hereby agrees that it will ensure that the Reserved Securities will be restricted as required by FINRA or the FINRA rules from sale, transfer, assignment, pledge or hypothecation for a period of three months following the date of this Agreement. The Underwriters will notify the Company as to which persons will need to be so restricted. At the request of the Underwriters, the Company will direct the transfer agent to place a stop transfer restriction upon such securities for such period of time. Should the Company release, or seek to release, from such restrictions any of the Reserved Securities, the Company agrees to reimburse the Underwriters for any reasonable expenses (including, without limitation, legal expenses) they incur in connection with such release.

  • Compliance with NASD Rules The Company hereby agrees that it will ensure that the Reserved Securities will be restricted as required by the National Association of Securities Dealers, Inc. (the "NASD") or the NASD rules from sale, transfer, assignment, pledge or hypothecation for a period of three months following the date of this Agreement. The Underwriters will notify the Company as to which persons will need to be so restricted. At the request of the Underwriters, the Company will direct the transfer agent to place a stop transfer restriction upon such securities for such period of time. Should the Company release, or seek to release, from such restrictions any of the Reserved Securities, the Company agrees to reimburse the Underwriters for any reasonable expenses (including, without limitation, legal expenses) they incur in connection with such release.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!