Compliance Audit LEA shall have the right but shall be under no obligation to conduct audit(s), from time to time, of Provider’s records concerning its compliance obligations as set forth in this Article V. Provider shall make such records and other documents available to LEA upon request.
Compliance Audits D. 4.1 Compliance Audit(s). Without limiting the generality of section A.7.4 (Records Review), if requested by the Province from time to time, which request shall be at the Province’s sole discretion, the Recipient, at its own expense, will forthwith retain an independent third party auditor to conduct one or more compliance audits of the Recipient or any Project. The audit will be conducted in accordance with Canadian Generally Accepted Auditing Standards, as adopted by the Canadian Institute of Chartered Accountants, applicable as of the date on which a record is kept or required to be kept under such standards. In addition, the audit will assess the Recipient’s compliance with the terms of the Agreement and will address, with respect to each Project, without limitation, the following: (a) whether the Funds were spent in accordance with the Agreement and with due regard to economy, efficiency, and effectiveness; (b) the Project’s progress or state of completion; (c) whether the financial information the Recipient provided is complete, accurate, and timely, and in accordance with the Agreement; (d) whether the Recipient’s information and monitoring processes and systems are adequate to identify, capture, validate, and monitor the achievement of intended benefits of the Project; (e) the overall management and administration of the Project; (f) recommendations for improvement or redress; and (g) whether prompt and timely corrective action is taken on prior audit findings.
Single Audit Act Compliance If the Contractor is a subrecipient and expends $750,000 or more in federal awards from any and/or all sources in any fiscal year, the Contractor shall procure and pay for a single audit or a program-specific audit for that fiscal year. Upon completion of each audit, the Contractor shall: (1) Submit to the DSHS contact person the data collection form and reporting package specified in 2 CFR Part 200, Subpart F, reports required by the program-specific audit guide (if applicable), and a copy of any management letters issued by the auditor; (2) Follow-up and develop corrective action for all audit findings; in accordance with 2 CFR Part 200, Subpart F; prepare a “Summary Schedule of Prior Audit Findings” reporting the status of all audit findings included in the prior audit's schedule of findings and questioned costs.
Response/Compliance with Audit or Inspection Findings A. Grantee must act to ensure its and its Subcontractors’ compliance with all corrections necessary to address any finding of noncompliance with any law, regulation, audit requirement, or generally accepted accounting principle, or any other deficiency identified in any audit, review, inspection or investigation of the Grant Agreement and the services and Deliverables provided. Any such correction will be at Grantee’s or its Subcontractor's sole expense. Whether Xxxxxxx's action corrects the noncompliance shall be solely the decision of the System Agency. B. As part of the services, Grantee must provide to HHS upon request a copy of those portions of Grantee's and its Subcontractors' internal audit reports relating to the services and Deliverables provided to the State under the Grant Agreement. C. Grantee shall include the requirement to provide to System Agency (and any of its duly authorized federal, state, or local authorities) internal audit reports related to this Grant Agreement in any Subcontract it awards. Upon request by System Agency, Grantee shall enforce this requirement against its Subcontractor. Further, Grantee shall include in any Subcontract it awards a requirement that all Subcontractor Subcontracts must also include these provisions.
Litigation and Compliance (a) Except as disclosed in the Disclosure Letter, to the best of GLC’s knowledge, there are no actions, suits, claims or proceedings, whether in equity or at law or, any Governmental investigations pending or threatened: (i) against or affecting GLC or the GLC Subsidiaries or with respect to or affecting any asset or property owned, leased or used by GLC or the GLC Subsidiaries; or (ii) which question or challenge the validity of this Agreement, or the Amalgamation or any action taken or to be taken pursuant to this Agreement, or the Amalgamation; nor is GLC aware of any basis for any such action, suit, claim, proceeding or investigation. (b) There is not outstanding against GLC or the GLC Subsidiaries, any judgment, decree, injunction, rule, order or award of any court, Governmental entity, commission, board, bureau, agency, or arbitrator. (c) Each of GLC and the GLC Subsidiaries has conducted and is conducting its business in compliance with, and is not in default or violation under, and has not received notice asserting the existence of any default or violation under, any Law applicable to its business or operations, except for non-compliance, defaults and violations which would not, in the aggregate, have a Material Adverse Effect on GLC. (d) Neither GLC nor any of its assets, including the GLC Subsidiaries, is subject to any judgment, order or decree entered in any lawsuit or proceeding which has had, or which is reasonably likely to have, a Material Adverse Effect on GLC or which is reasonably likely to prevent GLC from performing its obligations under this Agreement. (e) To the best knowledge of GLC, each of GLC and the GLC Subsidiaries has duly filed or made all reports and returns required to be filed by it with any Government and has obtained all permits, licenses, consents, approvals, certificates, registrations and authorizations (whether Governmental, regulatory or otherwise) which are required in connection with its business and operations, except where the failure to do so has not had and will not have a Material Adverse Effect on GLC.
Contractual and Operational Compliance Audits (a) ICANN may from time to time (not to exceed twice per calendar year) conduct, or engage a third party to conduct, contractual compliance audits to assess compliance by Registry Operator with its representations and warranties contained in Article 1 of this Agreement and its covenants contained in Article 2 of this Agreement. Such audits shall be tailored to achieve the purpose of assessing compliance, and ICANN will (a) give reasonable advance notice of any such audit, which notice shall specify in reasonable detail the categories of documents, data and other information requested by ICANN, and (b) use commercially reasonable efforts to conduct such audit during regular business hours and in such a manner as to not unreasonably disrupt the operations of Registry Operator. As part of such audit and upon request by ICANN, Registry Operator shall timely provide all responsive documents, data and any other information reasonably necessary to demonstrate Registry Operator’s compliance with this Agreement. Upon no less than ten (10) calendar days notice (unless otherwise agreed to by Registry Operator), ICANN may, as part of any contractual compliance audit, conduct site visits during regular business hours to assess compliance by Registry Operator with its representations and warranties contained in Article 1 of this Agreement and its covenants contained in Article 2 of this Agreement. ICANN will treat any information obtained in connection with such audits that is appropriately marked as confidential (as required by Section 7.15) as Confidential Information of Registry Operator in accordance with Section 7.15.
Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.
Standards Compliance Registry Operator shall comply with relevant existing RFCs and those published in the future by the Internet Engineering Task Force (IETF), including all successor standards, modifications or additions thereto relating to the DNS and name server operations including without limitation RFCs 1034, 1035, 1123, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 4343, and 5966. DNS labels may only include hyphens in the third and fourth position if they represent valid IDNs (as specified above) in their ASCII encoding (e.g., “xn--ndk061n”).
Regulatory Compliance Neither Borrower nor any of its Subsidiaries is an “investment company” or a company “controlled” by an “investment company” under the Investment Company Act of 1940, as amended. Neither Borrower nor any of its Subsidiaries is engaged as one of its important activities in extending credit for margin stock (under Regulations X, T and U of the Federal Reserve Board of Governors). Borrower and each of its Subsidiaries has complied in all material respects with the Federal Fair Labor Standards Act. Neither Borrower nor any of its Subsidiaries is a “holding company” or an “affiliate” of a “holding company” or a “subsidiary company” of a “holding company” as each term is defined and used in the Public Utility Holding Company Act of 2005. Neither Borrower nor any of its Subsidiaries has violated any laws, ordinances or rules, the violation of which could reasonably be expected to have a Material Adverse Change. Neither Borrower’s nor any of its Subsidiaries’ properties or assets has been used by Borrower or such Subsidiary or, to Borrower’s knowledge, by previous Persons, in disposing, producing, storing, treating, or transporting any hazardous substance other than in material compliance with applicable laws. Borrower and each of its Subsidiaries has obtained all consents, approvals and authorizations of, made all declarations or filings with, and given all notices to, all Governmental Authorities that are necessary to continue their respective businesses as currently conducted. None of Borrower, any of its Subsidiaries, or any of Borrower’s or its Subsidiaries’ Affiliates or any of their respective agents acting or benefiting in any capacity in connection with the transactions contemplated by this Agreement is (i) in violation of any Anti-Terrorism Law, (ii) engaging in or conspiring to engage in any transaction that evades or avoids, or has the purpose of evading or avoiding or attempts to violate, any of the prohibitions set forth in any Anti-Terrorism Law, or (iii) is a Blocked Person. None of Borrower, any of its Subsidiaries, or to the knowledge of Borrower and any of their Affiliates or agents, acting or benefiting in any capacity in connection with the transactions contemplated by this Agreement, (x) conducts any business or engages in making or receiving any contribution of funds, goods or services to or for the benefit of any Blocked Person, or (y) deals in, or otherwise engages in any transaction relating to, any property or interest in property blocked pursuant to Executive Order No. 13224, any similar executive order or other Anti-Terrorism Law.
Compliance Investigations Upon City’s request, Contractor agrees to provide to City, within sixty calendar days, a truthful and complete list of the names of all subcontractors, vendors, and suppliers that Contractor has used in the past five years on any of its contracts that were undertaken within San Diego County, including the total dollar amount paid by Contractor for each subcontract or supply contract. Contractor further agrees to fully cooperate in any investigation conducted by City pursuant to City's Nondiscrimination in Contracting Ordinance. Contractor understands and agrees that violation of this clause shall be considered a material breach of the Contract and may result in Contract termination, debarment, and other sanctions.