Record Keeping Requirements The Training Provider must make and keep accurate Records for all Training Services in sufficient detail to allow the Department to determine compliance with this Contract (including the accuracy of claims for payment of the Funds).
Compliance with Record Keeping Requirements Participating Dealer agrees to comply with the record keeping requirements of the Exchange Act, including but not limited to, Rules 17a-3 and 17a-4 promulgated under the Exchange Act. Participating Dealer further agrees to keep such records with respect to each customer who purchases Primary Shares, his suitability and the amount of Primary Shares sold, and to retain such records for such period of time as may be required by the Commission, any state securities commission, FINRA or the Company.
Reporting and Record Keeping CONTRACTOR shall comply with all program and fiscal reporting requirements set forth by appropriate Federal, State and local agencies, and as required by the COUNTY. (c) CONTRACTOR agrees to provide to COUNTY, to any Federal or State department having monitoring or review authority, to COUNTY's authorized representatives, and/or their appropriate audit agencies upon reasonable notice, access to and the right to examine all records and documents necessary to determine compliance with relevant Federal, State, and local statutes, rules and regulations, and this Agreement, and to evaluate the quality, appropriateness and timeliness of services performed.
Recordkeeping Requirements COLLEGE and SCHOOL DISTRICT shall comply with the requirements governing maintenance of records of each request for access to and each disclosure of, student education records set forth under Title 34, Code of Federal Regulations § 99.32 and under Education Code § 49064 as applicable.
Record Keeping The Adviser will maintain records in a form acceptable to the Trust and in compliance with the rules and regulations of the Securities and Exchange Commission, including but not limited to records required to be maintained by Section 31(a) of the Investment Company Act of 1940 and the rules thereunder, which at all times will be the property of the Trust and will be available for inspection and use by the Trust.
Records and Record Keeping Therapist may take notes during session, and will also produce other notes and records regarding Patient’s treatment. These notes constitute Therapist’s clinical and business records, which by law, Therapist is required to maintain. Such records are the sole property of Therapist. Therapist will not alter his/her normal record keeping process at the request of any patient. Should Patient request a copy of Therapist’s records, such a request must be made in writing. Therapist reserves the right, under California law, to provide Patient with a treatment summary in lieu of actual records. Therapist also reserves the right to refuse to produce a copy of the record under certain circumstances, but may, as requested, provide a copy of the record to another treating health care provider. Therapist will maintain Patient’s records for ten years following termination of therapy. However, after ten years, Patient’s records will be destroyed in a manner that preserves Patient’s confidentiality.
Reporting Requirements The Company, during the period when the Prospectus is required to be delivered under the 1933 Act or the 1934 Act, will file all documents required to be filed with the Commission pursuant to the 1934 Act within the time periods required by the 1934 Act and the 1934 Act Regulations.
RECORD RETENTION REQUIREMENTS To the extent applicable, Supplier must comply with the record retention requirements detailed in 2 C.F.R. § 200.333. The Supplier further certifies that it will retain all records as required by 2 C.F.R. § 200.333 for a period of 3 years after grantees or subgrantees submit final expenditure reports or quarterly or annual financial reports, as applicable, and all other pending matters are closed.
General Reporting Requirements The MA-PD Sponsor agrees to submit to information to CMS according to 42 CFR §§423.505(f), 423.514, and the “Final Medicare Part D Reporting Requirements,” a document issued by CMS and subject to modification each program year.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.