Data Integrity Practices Sample Clauses

Data Integrity Practices. All activities conducted under the Transition Plan will be conducted in accordance with the following practices:
AutoNDA by SimpleDocs
Data Integrity Practices. All activities conducted under the Collaboration Plans, including the conduct of any clinical studies, will be conducted in accordance with the following practices:
Data Integrity Practices. (a) Each Party and its respective Affiliates shall, and shall require its and their respective Sublicensees and Third Party subcontractors to, conduct all Shared Global Development Activities, including any Clinical Trials under the Joint Development Plan, in accordance with the following practices:

Related to Data Integrity Practices

  • Data Integrity CUSTOMER will ensure that all data and information submitted by it to PROVIDER for performing the Services shall be accurate and complete and furnished in a timely manner.

  • Compliance Program The Company has established and administers a compliance program applicable to the Company, to assist the Company and the directors, officers and employees of the Company in complying with applicable regulatory guidelines (including, without limitation, those administered by the FDA, the EMA, and any other foreign, federal, state or local governmental or regulatory authority performing functions similar to those performed by the FDA or EMA); except where such noncompliance would not reasonably be expected to have a Material Adverse Effect.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Operating Procedures The Service Provider intends to clear trades for Fund Shares through, and make use of, the National Securities Clearing Corporation’s (“NSCC’s”) Fund/Serv and, in connection therewith, agrees to follow and comply with the procedures, terms and conditions set forth in the operating procedures set forth in Exhibit A hereto, as supplemented or amended from time to time by the mutual agreement of the parties hereto (the “Operating Procedures”).

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Anti-Money Laundering/International Trade Law Compliance No Covered Entity is a Sanctioned Person. No Covered Entity, either in its own right or through any third party, (i) has any of its assets in a Sanctioned Country or in the possession, custody or control of a Sanctioned Person in violation of any Anti-Terrorism Law; (ii) does business in or with, or derives any of its income from investments in or transactions with, any Sanctioned Country or Sanctioned Person in violation of any Anti-Terrorism Law; or (iii) engages in any dealings or transactions prohibited by any Anti-Terrorism Law.

  • Reporting Procedures The Executive shall report to the Board of Directors. The Executive shall report fully on the management, operations and business affairs of the Corporation and advise to the best of his ability and in accordance with reasonable business standards on business matters that may arise from time to time during the term of this agreement.

  • Anti-Money Laundering Program Procedures You represent and warrant that you have adopted and implemented policies and procedures to comply with all anti-money laundering, customer identification and verification, suspicious activity, currency transaction reporting and similar laws and regulations, including, but not limited to, the Bank Secrecy Act, as amended by the USA PATRIOT Act, and the regulations thereunder, applicable to you. You also represent and warrant that you will not purchase or sell Fund shares, or otherwise facilitate any transaction, on behalf of any person on the list of Specially Designated Nationals and Blocked Persons maintained by the Office of Foreign Assets Control (“OFAC”), or other similar governmental lists, or in contravention of any OFAC maintained sanctions program. You agree to share information with the Fund for purposes of ascertaining whether a suspicious activity report (“SAR”) is warranted with respect to any suspicious transaction involving Fund shares, provided that neither you nor the Fund is the subject of the SAR filing. You also represent and warrant that you have filed the requisite certification with the Financial Crimes Enforcement Network (“FinCEN”) to allow you to share information pursuant to Section 314(b) of the USA PATRIOT Act. In addition, you shall, to the extent consistent with applicable law, take all steps necessary and appropriate to provide the Funds and/or us with any requested information about investors and accounts in the event that the Funds or we shall request such information in response to an inquiry or investigation by an appropriate authority.

  • Procedural Requirements All holders of record of shares of Preferred Stock shall be sent written notice of the Mandatory Conversion Time and the place designated for mandatory conversion of all such shares of Preferred Stock pursuant to this Section 6. Such notice need not be sent in advance of the occurrence of the Mandatory Conversion Time. Upon receipt of such notice, each holder of shares of Preferred Stock shall surrender his, her or its certificate or certificates for all such shares (or, if such holder alleges that such certificate has been lost, stolen or destroyed, a lost certificate affidavit and agreement reasonably acceptable to the Corporation to indemnify the Corporation against any claim that may be made against the Corporation on account of the alleged loss, theft or destruction of such certificate) to the Corporation at the place designated in such notice. If so required by the Corporation, certificates surrendered for conversion shall be endorsed or accompanied by written instrument or instruments of transfer, in form satisfactory to the Corporation, duly executed by the registered holder or by his, her or its attorney duly authorized in writing. All rights with respect to the Preferred Stock converted pursuant to Section 6.1, including the rights, if any, to receive notices and vote (other than as a holder of Common Stock), will terminate at the Mandatory Conversion Time (notwithstanding the failure of the holder or holders thereof to surrender the certificates at or prior to such time), except only the rights of the holders thereof, upon surrender of their certificate or certificates (or lost certificate affidavit and agreement) therefor, to receive the items provided for in the next sentence of this Subsection 6.2. As soon as practicable after the Mandatory Conversion Time and the surrender of the certificate or certificates (or lost certificate affidavit and agreement) for Preferred Stock, the Corporation shall issue and deliver to such holder, or to his, her or its nominees, a certificate or certificates for the number of full shares of Common Stock issuable on such conversion in accordance with the provisions hereof, together with cash as provided in Subsection 5.2 in lieu of any fraction of a share of Common Stock otherwise issuable upon such conversion and the payment of any declared but unpaid dividends on the shares of Preferred Stock converted. Such converted Preferred Stock shall be retired and cancelled and may not be reissued as shares of such series, and the Corporation may thereafter take such appropriate action (without the need for stockholder action) as may be necessary to reduce the authorized number of shares of Preferred Stock accordingly.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Time is Money Join Law Insider Premium to draft better contracts faster.