COMPLIANCE WITH LENDER POLICIES AND PROCEDURES; TRID RULE Sample Clauses

COMPLIANCE WITH LENDER POLICIES AND PROCEDURES; TRID RULE. (a) The origination of each mortgage loan complies in all respects with the terms of this Agreement. Each Application submitted was originated by Broker and not by a third party. All Applications, including all mortgage loan documents and information and documentation submitted in connection with such Applications, have been prepared and/or completed in accordance with applicable law and all information provided by each of Applicant and Broker in such Applications are true and correct in all respects and do not fail to disclose any facts which could be material or which would make such information misleading. All broker compensation has been fully disclosed to Applicant in compliance with applicable laws. The Applicant has executed and received a copy of the broker disclosure(s) as required by applicable law and there are no disputes with respect to Broker’s compensation in connection with the origination or closing of each mortgage loan. (b) Each Application submitted by Broker to Lender was submitted to Lender no later than the end of the second business day after Broker’s receipt of the Applicant’s “Application,” as that term is defined in 12 CFR § 1026.2(a)(3)(i) and (ii). Each Loan Estimate delivered to Lender was created, generated and drafted using the electronic portal hosted by Lender specifically for such purpose. The terms included within any Application submitted by Broker to Lender are not identical to the terms of any loan application previously withdrawn by the Applicant prior to delivery of a Loan Estimate to the Applicant.
AutoNDA by SimpleDocs

Related to COMPLIANCE WITH LENDER POLICIES AND PROCEDURES; TRID RULE

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance with Policies Each Individual Limited Partner hereby agrees that he shall comply with all policies and procedures adopted by any member of the Och-Ziff Group or which Limited Partners are required to observe by law, or by any recognized stock exchange, or other regulatory body or authority.

  • Compliance with Rules and Policies The Executive shall perform all services in accordance with the lawful policies, procedures and rules established by the Company and the Board. In addition, the Executive shall comply with all laws, rules and regulations that are generally applicable to the Company or its subsidiaries and their respective employees, directors and officers.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-­‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Compliance with Laws, Rules and Regulations a. Assurances. The Contractor agrees that all activity pursuant to this Contract will be in accordance with all applicable current federal, state and local laws, rules, and regulations, including but not limited to the Public Records Act (chapter 42.56 RCW), the Freedom of Information Act (5 U.S.C. 522) and the Records Retention Act (chapter 40.14 RCW).

  • Performance and Compliance with Contracts and Credit and Collection Policy The Seller shall (and shall cause the Servicer to), at its expense, timely and fully perform and comply with all material provisions, covenants and other promises required to be observed by it under the Contracts related to the Receivables, and timely and fully comply in all material respects with the applicable Credit and Collection Policies with regard to each Receivable and the related Contract.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!