Compliance with Rules To comply with, and to require the Contractors to comply with, all rules, regulations, ordinances and laws bearing on the conduct of the work on the Improvements, including the requirements of any insurer issuing coverage on the Project and the requirements of any applicable supervising boards of fire underwriters.
Compliance with State Law The Business Associate acknowledges that by accepting the PHI from Covered Entity, it becomes a holder of medical information under the MCMRA and is subject to the provisions of that law. If the HIPAA Privacy or Security Rules and the MCMRA conflict regarding the degree of protection provided for PHI, Business Associate shall comply with the more restrictive protection requirement.
Compliance with Nondiscrimination Requirements During the performance of this contract, the Contractor, for itself, its assignees, and successors in interest (hereinafter referred to as the “Contractor”), agrees as follows:
Compliance with Xxxxx Xxxxx and Related Act requirements. All rulings and interpretations of the Xxxxx- Xxxxx and Related Acts contained in 29 CFR parts 1, 3, and 5 are herein incorporated by reference in this contract.
Compliance with Requirements Any investment program furnished, and any activities performed, by the Manager or by a Sub-Adviser under this Section shall at all times conform to, and be in accordance with, any requirements imposed by: (1) the Act and any rules or regulations in force thereunder; (2) any other applicable laws, rules and regulations; (3) the Declaration of Trust and By-Laws of the Fund as amended from time to time; (4) any policies and determinations of the Board of Trustees of the Fund; and (5) the fundamental policies of the Fund, as reflected in its Registration Statement under the Act or as amended by the shareholders of the Fund.
Compliance with Accessibility Standards All parties to this Agreement shall ensure that the plans for and the construction of all projects subject to this Agreement are in compliance with standards issued or approved by the Texas Department of Licensing and Regulation (TDLR) as meeting or consistent with minimum accessibility requirements of the Americans with Disabilities Act (P.L. 101-336) (ADA).
Compliance with Rules and Regulations PFPC undertakes to comply with all applicable requirements of the Securities Laws and any laws, rules and regulations of governmental authorities having jurisdiction with respect to the duties to be performed by PFPC hereunder. Except as specifically set forth herein, PFPC assumes no responsibility for such compliance by the Fund or any other entity.
Compliance with Privacy Laws NCPS represents and warrants that its collection, access, use, storage, disposal and disclosure of Personal Data does and will comply with all applicable federal and state privacy and data protection laws, as well as all other applicable regulations. Without limiting the foregoing, NCPS shall implement administrative, physical and technical safeguards to protect Personal Data that are no less rigorous than accepted industry, and shall ensure that all such safeguards, including the manner in which Personal Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with applicable data protection and privacy laws, as well as the terms and conditions of this Escrow Agreement. NCPS shall use and disclose Personal Data solely and exclusively for the purposes for which the Personal Data, or access to it, is provided pursuant to the terms and conditions of this Escrow Agreement, and not use, sell, rent, transfer, distribute, or otherwise disclose or make available Personal Data for NCPS’s own purposes or for the benefit of any party other than Issuer. For purposes of this section, “Personal Data” shall mean information provided to NCPS by or at the direction of the Issuer, or to which access was provided to NCPS by or at the direction of the Issuer, in the course of NCPS’s performance under this Escrow Agreement that: (i) identifies or can be used to identify an individual (also known as a “data subject”) (including, without limitation, names, signatures, addresses, telephone numbers, e-mail addresses and other unique identifiers); or (ii) can be used to authenticate an individual (including, without limitation, employee identification numbers, government-issued identification numbers, passwords or PINs, financial account numbers, credit report information, biometric or health data, answers to security questions and other personal identifiers), including the identifying information on individuals described in Section 12.