FINANCIAL POLICIES AND PROCEDURES Sample Clauses

FINANCIAL POLICIES AND PROCEDURES. A late pick-up fee of $1.00 per minute will be assessed when a child is left beyond their scheduled hours or our operating hours. The late pick-up fee does not constitute an agreement to provide after-hours service nor will the late fee be applied toward tuition. Chronic lateness at closing time may be grounds for termination of preschool or a permanent additional fee.
FINANCIAL POLICIES AND PROCEDURES. Students with financial holds on their accounts are required to clear those holds before they may leave for the Program.
FINANCIAL POLICIES AND PROCEDURES. 1. A detailed, final line item budget will be attached to this Agreement as ATTACHMENT A and the funds provided by the CITY may only be expended as budgeted, consistent with the purpose and scope described in Article I. 2. CHS’s Board of Directors shall approve budget category changes as recommended by CHS or the CITY in excess of 10% of final budget amount or $3,000, whichever is greater. 3. CHS shall not provide compensation in the form of bonuses using any CITY funds. 4. All checks issued by CHS are to be signed by any two of four designated signatories. 5. Any single purchase or contract that uses any funding provided by the CITY under this agreement that is in excess of $10,000 shall be approved by CITY Manager. Any expenditure that exceeds $10,000 and is not approved by the CITY Manager cannot be paid with funds provided by the CITY. 6. As provided in the policies and procedures, CHS’s Board of Directors will adopt the CHS budget and the President’s compensation. 7. In no case shall any CITY funds referred to herein be used to pay any portion of any cost, expense or obligation of CHS that is not incurred as a result of its obligations under this Agreement. 8. It is expressly understood and acknowledged by CHS that any failure to comply with any portion of this agreement, CHS’s Bylaws, or CHS’s Charter (Act/Enabling Legislation) will be considered a violation of this agreement and may serve as grounds for suspension or cancellation of payment, and/or termination of this agreement, and that any decision on the part of the CITY not to enforce the provisions of this paragraph in any specific instance or instances shall not operate in any way as a waiver or partial waiver of the CITY’S rights under this paragraph, including the right to rescind an earlier decision not to enforce the provisions of this paragraph.
FINANCIAL POLICIES AND PROCEDURES. What type of accounting system does the organization use? How is the system implemented? Is the organization using accounting software? Yes No N/A Comments/Quality Notes Which financial procedures are documented? How are financial procedures developed and approved? How often are the financial procedures formally reviewed/updated? What is included in the financial policies and procedures? How are staff members oriented/trained in the procedures? How often? Does the organization have separate accounts for separate programs? Does the organization use codes to assign transactions to a specific project/donor? Is there cashbook (or bank journal) completed in ink used for each bank account? How are account balances kept? Are all payments and receipts recorded in the organization’s bookkeeping system? How are transactions in the accounting system linked to supporting documentation? What systems ensure compliance with financial procedures? At the end of the fiscal year how are accruals recorded?
FINANCIAL POLICIES AND PROCEDURES. It is your responsibility to read and understand all of the center policies and to abide by them at all times. If you have any question, please see the center director before signing this agreement.

Related to FINANCIAL POLICIES AND PROCEDURES

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees. 7.1.2 The Employees will observe and act in accordance with Company policies and procedures that apply to the Employees, as implemented and amended from time to time.

  • General Policies 9.6.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 Authorized users shall not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.