COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.
Compliance with Policies Each Individual Limited Partner hereby agrees that he shall comply with all policies and procedures adopted by any member of the Och-Ziff Group or which Limited Partners are required to observe by law, or by any recognized stock exchange, or other regulatory body or authority.
Compliance with Rules and Policies The Executive shall perform all services in accordance with the lawful policies, procedures and rules established by the Company and the Board. In addition, the Executive shall comply with all laws, rules and regulations that are generally applicable to the Company or its subsidiaries and their respective employees, directors and officers.
Compliance with Governmental Rules and Regulations Except as otherwise provided in the Agreement and except for the accuracy of information furnished to the Fund by Price Services, each Fund assumes full responsibility for the preparation, contents and distribution of its prospectuses and compliance with all applicable requirements of the ’40 Act, the ‘34 Act, the ‘33 Act, and any other laws, rules and regulations of governmental authorities having jurisdiction over the Fund. Price Services shall be responsible for complying with all laws, rules and regulations of governmental authorities having jurisdiction over transfer agents and their activities and cooperating with respect to examinations and requests from such governmental authorities.
Compliance with Rules To comply with, and to require the Contractors to comply with, all rules, regulations, ordinances and laws bearing on the conduct of the work on the Improvements, including the requirements of any insurer issuing coverage on the Project and the requirements of any applicable supervising boards of fire underwriters.
Compliance with OFAC Rules and Regulations None of the Credit Parties or their Subsidiaries or their respective Affiliates (a) is a Sanctioned Person, (b) has more than 15% of its assets in Sanctioned Countries, or (c) derives more than 15% of its operating income from investments in, or transactions with Sanctioned Persons or Sanctioned Countries. No part of the proceeds of any Extension of Credit hereunder will be used directly or indirectly to fund any operations in, finance any investments or activities in or make any payments to, a Sanctioned Person or a Sanctioned Country.
Compliance with Laws, Rules and Regulations a. Assurances. The Contractor agrees that all activity pursuant to this Contract will be in accordance with all applicable current federal, state and local laws, rules, and regulations, including but not limited to the Public Records Act (chapter 42.56 RCW), the Freedom of Information Act (5 U.S.C. 522) and the Records Retention Act (chapter 40.14 RCW).
Compliance with Orders The Company is not in violation of any material judgment, decree, or order of any court, arbitrator or other governmental authority.
Compliance with FINRA Rules The Company hereby agrees that it will ensure that the Reserved Securities will be restricted as required by FINRA or the FINRA rules from sale, transfer, assignment, pledge or hypothecation for a period of three months following the date of this Agreement. The Underwriters will notify the Company as to which persons will need to be so restricted. At the request of the Underwriters, the Company will direct the transfer agent to place a stop transfer restriction upon such securities for such period of time. Should the Company release, or seek to release, from such restrictions any of the Reserved Securities, the Company agrees to reimburse the Underwriters for any reasonable expenses (including, without limitation, legal expenses) they incur in connection with such release.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.