Costs must be identifiable and verifiable Sample Clauses

Costs must be identifiable and verifiable. All declared costs must be identifiable and verifiable, i.e. supported by persuasive evidence allowing for a sufficient audit trail. The sufficiency and the persuasiveness of the evidence provided, as well as the audit trail, will be assessed against the International Standards on Auditing. − proper registration in the assets’ register − evidence of actual use for the action, e.g. through time registration − adequate calculation of potential use (total productive time) − adequate calculation of the useful economic life of the asset − evidence that depreciation is calculated in line with the beneficiary’s usual accounting principles and the applicable accounting standards.
AutoNDA by SimpleDocs
Costs must be identifiable and verifiable. All declared costs must be identifiable and verifiable, i.e. supported by persuasive evidence allowing for a sufficient audit trail. The sufficiency and the persuasiveness of the evidence provided, as well as the audit trail, will be assessed against the International Standards on Auditing. Capitalised costs claimed as depreciation costs must be supported by:  proper registration in the assets’ register

Related to Costs must be identifiable and verifiable

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • Supplier Diversity Seller shall comply with Xxxxx’s Supplier Diversity Program in accordance with Appendix V.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Environmental and Social Safeguards (a) The Borrower, through PMD, shall ensure that each Sub-Project is prepared, implemented and monitored in accordance with the Implementation Guidelines for Social and Environmental Safeguards, which form a supplement to the Operations Manual, and all guidelines and checklists set out therein, including those specifically provided for Indigenous Peoples and land donation, and the Negative List. (b) In the event of any conflict between the provisions of the Implementation Guidelines for Social and Environmental Safeguards and those of this Agreement, the latter shall prevail. 2. The Borrower, through PMD, shall apply the section of the Implementation Guidelines for Social and Environmental Safeguards in each Sub-Project that may affect Indigenous Peoples, in a manner to ensure that the Sub-Project shall: (a) avoid, and, if not possible, minimize cultural, social and economic adverse effects on Indigenous Peoples, caused or likely to be caused by the Project, by taking appropriate mitigating measures; and (b) through a process of free, prior and informed participation, involve concerned Indigenous Peoples in the design and implementation of Sub- projects in which such people reside or make their living and design and implement measures so as to ensure that the benefits received by the Indigenous Peoples under the Project are in harmony with their economic, social and cultural preferences, and likely to protect their customary user rights and reduce, mitigate and offset any adverse impacts of Sub-projects. 3. The Borrower, through PMD, shall ensure that the proceeds of Kecamatan Grants shall not be used to finance the acquisition of land or compensation for involuntary resettlement and that no Sub-Project shall require or permit the involuntary acquisition of land or involuntary resettlement. The Borrower, through PMD, shall ensure that in any Sub-Project involving land donation, the planning and verification procedures for land donation (voluntary donation and donation with compensation) set out in the Implementation Guidelines for Social and Environmental Safeguards shall have been followed and documented in a manner satisfactory to the Bank and PMD prior to the commencement of the Sub-Project. 4. The Borrower shall ensure that the proceeds of the Loan are not used to finance any activities or materials on the Negative List as set out in Section A.2 of Annex 1 to this Schedule 2. 5. Without limiting the obligations under Section II.A of this Schedule 2, the Borrower shall include in each Project Report: (a) information on the status of compliance with the Implementation Guidelines for Social and Environmental Safeguards; (b) details of measures taken for each Sub-Project in the implementation of such guidelines; (c) conditions, if any, in any Sub-Project which interfere or threaten to interfere with the implementation of such guidelines; and (d) remedial measures taken or required to be taken to address such conditions.

  • Customer Identification Program (A) To assist the Fund in complying with requirements regarding a customer identification program in accordance with applicable regulations promulgated by U.S. Department of Treasury under Section 326 of the USA PATRIOT Act ("CIP Regulations"), BNYM will do the following: (i) Implement procedures which require that prior to establishing a new account in the Fund BNYM obtain the name, date of birth (for natural persons only), address and government-issued identification number (collectively, the "Data Elements") for the "Customer" (defined for purposes of this Agreement as provided in 31 CFR 1024.100(c)) associated with the new account. (ii) Use collected Data Elements to attempt to reasonably verify the identity of each new Customer promptly before or after each corresponding new account is opened. Methods of verification may consist of non-documentary methods (for which BNYM may use unaffiliated information vendors to assist with such verifications) and documentary methods (as permitted by 31 CFR 1024.220), and may include procedures under which BNYM personnel perform enhanced due diligence to verify the identities of Customers the identities of whom were not successfully verified through the first- level (which will typically be reliance on results obtained from an information vendor) verification process(es). (iii) Record the Data Elements and maintain records relating to verification of new Customers consistent with 31 CFR 1024.220(a)(3). (iv) Regularly report to the Fund about measures taken under (i)-(iii) above. (v) If BNYM provides services by which prospective Customers may subscribe for shares in the Fund via the Internet or telephone, BNYM will work with the Fund to notify prospective Customers, consistent with 31 CFR 1024.220(a)(5), about the program conducted by the Fund in accordance with the CIP Regulations. (B) To assist the Fund in complying with the Customer Due Diligence Requirements for Financial Institutions promulgated by FinCEN (31 CFR § 1020.230) pursuant to the Bank Secrecy Act ("CDD Rule"), BNYM will maintain and implement written procedures that are reasonably designed to: (i) Obtain information of a nature and in a manner permitted or required by the CCD Rule in order to identify each natural person who is a "beneficial owner" (as that term is defined in the CDD Rule) of a legal entity at the time that such legal entity seeks to open an account as a shareholder of the Fund, unless that legal entity is excluded from the CDD Rule or an exemption provided for in the CDD Rule applies; and (ii) Verify the identity of each beneficial owner so identified according to risk based procedures to the extent reasonable and practicable, in accordance with the minimum requirements of the CDD Rule. (C) Nothing in Section (3) shall be construed to require BNYM to perform any course of conduct that is not required for Fund compliance with the CIP Regulations or CDD Rule, including by way of illustration not limitation the collection of Data Elements or verification of identity for individuals opening Fund accounts through financial intermediaries which use the facilities of the NSCC. (D) BNYM agrees to permit inspections relating to the CIP services provided hereunder by U.S. Federal departments or regulatory' agencies with appropriate jurisdiction and to make available to examiners from such departments or regulatory agencies such information and records relating to the CIP services provided hereunder as such examiners shall reasonably request.

  • Periodic Review of Costs of Environmental Compliance In the ordinary course of its business, the Company conducts a periodic review of the effect of Environmental Laws on the business, operations and properties of the Company and its subsidiaries, in the course of which it identifies and evaluates associated costs and liabilities (including, without limitation, any capital or operating expenditures required for clean-up, closure of properties or compliance with Environmental Laws or any permit, license or approval, any related constraints on operating activities and any potential liabilities to third parties). On the basis of such review and the amount of its established reserves, the Company has reasonably concluded that such associated costs and liabilities would not, individually or in the aggregate, result in a Material Adverse Change.

  • No Reliance on Administrative Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Administrative Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA Patriot Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any of the Loan Parties, their Affiliates or their agents, the Loan Documents or the transactions hereunder or contemplated hereby: (i) any identity verification procedures, (ii) any recordkeeping, (iii) comparisons with government lists, (iv) customer notices or (v) other procedures required under the CIP Regulations or such other Laws.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Solicitations for Subcontractors, Including Procurements of Materials and Equipment In all solicitations either by competitive bidding or negotiation made by the contractor for work to be performed under a subcontract, including procurements of materials or leases of equipment, each potential subcontractor or supplier shall be notified by the contractor of the contractor's obligations under this contract and the Regulations relative to nondiscrimination on the grounds of race, color, or national origin, sex, age, and disability/handicap.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!