Special Instructions As used herein, the term "Special Instructions" shall mean Proper Instructions countersigned or confirmed in writing by the Treasurer or any Deputy or Assistant Treasurer of the applicable Fund or any other person designated by the Treasurer of such Fund in writing, which countersignature or confirmation shall be (i) included on the same instrument containing the Proper Instructions or on a separate instrument relating thereto, and (ii) delivered by hand, by facsimile transmission, or in such other manner as the applicable Fund and the Custodian agree in writing.
Proper Instructions and Special Instructions “Proper Instructions,” which may also be standing instructions, as such term is used throughout this Agreement shall mean instructions received by the Custodian from a Fund, a Fund’s duly authorized investment manager or investment adviser, or a person or entity duly authorized by either of them. Such instructions may be in writing signed by the authorized person or persons or may be in a tested communication or in a communication utilizing access codes effected between electro-mechanical or electronic devices or may be by such other means and utilizing such intermediary systems and utilities as may be agreed from time to time by the Custodian and the person(s) or entity giving such instruction, provided that the Fund has followed any security procedures agreed to from time to time by the applicable Fund and the Custodian including, but not limited to, the security procedures selected by the Fund via the form of Funds Transfer Addendum hereto, the terms of which are hereby agreed to. Oral instructions will be considered Proper Instructions if the Custodian reasonably believes them to have been given by a person authorized to provide such instructions with respect to the transaction involved; the Fund shall cause all oral instructions to be confirmed in writing. For purposes of this Section, Proper Instructions shall include instructions received by the Custodian pursuant to any multi-party agreement which requires a segregated asset account in accordance with Section 2.9 hereof.
Certification Regarding Lobbying 4 Applicable to Grants, Subgrants, Cooperative Agreements, and Contracts Exceeding $100,000 in Federal Funds (1) No Federal appropriated funds have been paid or will be paid by or on behalf of the undersigned, to any person for influencing or attempting to influence an officer or employee of any agency, a Member of Congress, an officer or employee of congress, or an employee of a Member of Congress in connection with the awarding of a Federal contract, the making of a Federal grant, the making of a Federal loan, the entering into a cooperative agreement, and the extension, continuation, renewal, amendment, or modification of a Federal contract, grant, loan, or cooperative agreement. (2) If any funds other than Federal appropriated funds have been paid or will be paid to any person for influencing or attempting to influence an officer or employee of any agency, a Member of Congress, an officer or employee of congress, or an employee of a Member of Congress in connection with this Federal grant or cooperative agreement, the undersigned shall complete and submit Standard Form-LLL, “disclosure Form to Report Lobbying,” in accordance with its instructions. (3) The undersigned shall require that the language of this certification be included in the award documents for all covered subawards exceeding $100,000 in Federal funds at all appropriate tiers and that all subrecipients shall certify and disclose accordingly. I HAVE NOT Lobbied per above
Vendor Certification of Criminal History Texas Education Code Chapter 22 8 Texas Education Code Chapter 22 requires entities that contract with school districts to provide services to obtain DEFINITIONS Covered employees: Employees of a contractor or subcontractor who have or will have continuing duties related to the service to be performed at the District and have or will have direct contact with students. The District will be the final arbiter of what constitutes direct contact with students. Disqualifying criminal history: Any conviction or other criminal history information designated by the District, or one of the following offenses, if at the time of the offense, the victim was under 18 or enrolled in a public school: (a) a felony offense under Title 5, Texas Penal Code; (b) an offense for which a defendant is required to register as a sex offender under Chapter 62, Texas Code of Criminal Procedure; or (c) an equivalent offense under federal law or the laws of another state. Vendor certifies: NONE (Section A): None of the employees of Vendor and any subcontractors are covered employees, as defined above. If this box is checked, I further certify that Contractor has taken precautions or imposed conditions to ensure that the employees of Vendor and any subcontractor will not become covered employees. Contractor will maintain these precautions or conditions throughout the time the contracted services are provided under this procurement. SOME (Section B): Some or all of the employees of Vendor and any subcontractor are covered employees. If this box is checked, I further certify that: (1) Vendor has obtained all required criminal history record information regarding its covered employees. None of the covered employees has a disqualifying criminal history; (2) If Vendor receives information that a covered employee subsequently has a reported criminal history, Vendor will immediately remove the covered employee from contract duties and notify the purchasing entity in writing within 3 business days; (3) Upon request, Vendor will provide the purchasing entity with the name and any other requested information of covered employees so that the purchasing entity may obtain criminal history record information on the covered employees; (4) If the purchasing entity objects to the assignment of a covered employee on the basis of the covered employee's criminal history record information, Xxxxxx agrees to discontinue using that covered employee to provide services at the purchasing entity. Certification Regarding "Choice of Law" Terms with TIPS Members Certification Regarding "Venue" Terms with TIPS Members Certification Regarding "Automatic Renewal" Terms with TIPS Members Certification Regarding "Indemnity" Terms with TIPS Members Certification Regarding "Arbitration" Terms with TIPS Members
Predatory Lending Regulations No Mortgage Loan is a High Cost Loan or Covered Loan, as applicable, and no Mortgage Loan originated on or after October 1, 2002 through March 6, 2003 is governed by the Georgia Fair Lending Act. No Mortgage Loan is covered by the Home Ownership and Equity Protection Act of 1994 and no Mortgage Loan is in violation of any comparable state or local law;
Suspension or Debarment Instructions Instructions for Certification 1. By answering yes to the next Attribute question below, the vendor and prospective lower tier participant is providing the certification set out herein in accordance with these instructions.
PROCUREMENT LOBBYING To the extent this agreement is a "procurement contract" as defined by State Finance Law Sections 139-j and 139-k, by signing this agreement the contractor certifies and affirms that all disclosures made in accordance with State Finance Law Sections 139-j and 139-k are complete, true and accurate. In the event such certification is found to be intentionally false or intentionally incomplete, the State may terminate the agreement by providing written notification to the Contractor in accordance with the terms of the agreement.
Procurement from UN Agencies Goods estimated to cost less than $100,000 equivalent per contract may be procured directly from Inter-Agency Procurement Services Office (IAPSO) in accordance with the provisions of paragraphs 3.1 and 3.9 of the Procurement Guidelines.
Audio Conferencing In lieu of any other rates and discounts, Customer will pay fixed per-minute per bridge rates ranging from $0.0095 to $0.3200 for the following Conferencing Services: Domestic Audio Conferencing: Fixed per-minute rates per participant for domestic Audio Conferencing calls originating and terminating in the U.S. Mainland, Alaska, Hawaii, Puerto Rico, and the U.S. Virgin Islands, based on method. Instant Replay Plus: Fixed per-minute per-participant rates for Instant Replay Plus usage using toll free number access and toll number access.
Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.