Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.
Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.
Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.
Relationship Management LAUSD expects Contractors and their Representatives to ensure that their business dealings with and/or on behalf of LAUSD are conducted in a manner that is above reproach.
Financial Management (a) The Recipient shall ensure that a financial management system is maintained in accordance with the provisions of Section 2.09 of the Standard Conditions.
Pain Management Inpatient rehabilitation for Pain Management is excluded.
Fiscal Management Grantee must have accounting and internal control systems to ensure proper management of federal and state funds, maximize non-federal resources, and maintain solvency. Xxxxxxx’s accounting and internal control systems must meet the following requirements:
Adaptive Management This CCAA is based on the principles of Adaptive Management set out in 65 Fed. Reg. at 35,242. The adaptive management process is a structured approach for dealing with uncertainty. The adaptive management process develops hypotheses regarding uncertainty and research to test those hypotheses in an iterative process to develop effective strategies for minimizing the uncertainty. The signatories to this CCAA agree and recognize that implementation of the Conservation Strategy objectives and criteria, Conservation Measures and Actions, and the Covered Area may change as new science emerges. The effectiveness of the Conservation Strategy objectives and criteria, Conservation Measures, Conservation Actions, monitoring methods, and new technologies will be reviewed by the Administrator on an annual basis, with input from the Adaptive Management Committee. The Adaptive Management Committee will be responsible for reviewing and evaluating the effectiveness of Conservation Program under the 2020 DSL CCAA as described in Sections 2.0 and 16.1, including the effectiveness and implementation of the Conservation Strategy, Conservation Measures and Conservation Actions; setting priorities for DSL Habitat conservation and monitoring habitat loss; and recommending changes to any aspect of the Conservation Program based on new science. As a result, appropriate modifications to the Conservation Measures and Actions may be incorporated to further refine the goals and objectives of this 2020 DSL CCAA. Such modifications are incorporated into existing CIs, if they were identified in changed circumstances in the 2020 DSL CCAA. Modifications not related to changed circumstances identified in the 2020 DSL CCAA and instead related to unforeseen circumstances may be incorporated into new CIs that take effect after the modifications have been made and to existing CIs only with written consent from the Participants and Service. Additionally, research projects that are designed to determine the effectiveness of management practices will be encouraged and utilized to determine what Adaptive Management is necessary. Changes resulting from Adaptive Management will flow through the Governance structure as described in Section 2.0 of this CCAA.
Information Technologies Cooperation 1. The aims of cooperation in Information Technologies sectors, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to focus on cooperative activities towards information technology areas where mutual and complementary interests exists; and (b) to build on existing agreements and arrangements already in place between the Parties. 2. Information Technologies cooperation may include, but not be limited to: (a) scientific and technical cooperation for the Software Industry of the Parties and encouraging cooperation in software development for populations with specific needs; (b) facilitate the cooperation on academic, industrial and entrepreneurial networks in the area of Information Technology; (c) encouraging exchange of experience on management and research and development for Information Technology Parks; (d) research and development on Information Technology products and services, integrating television, multimedia, and cellular telephones; and (e) encouraging exchange of experience for research and development in networks and telecommunications.
Financial Services The aim of cooperation shall be to achieve closer common rules and standards in areas including the following: