Compliance with Texas Privacy Laws and Regulations In performing their respective obligations under the Agreement, the LEA and the Provider shall comply with all Texas laws and regulations pertaining to LEA data privacy and confidentiality, including but not limited to the Texas Education Code Chapter 32, and Texas Government Code Chapter 560.
Compliance with Safeguarding Customer Information Requirements The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616, and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Seller information regarding the implementation of such security measures upon the reasonable request of the Seller.
Contracting Information Requirements Contractor represents and warrants that it will comply with the requirements of Section 552.372(a) of the Texas Government Code. Except as provided by Section 552.374(c) of the Texas Government Code, the requirements of Subchapter J (Additional Provisions Related to Contracting Information), Chapter 552 of the Government Code, may apply to the Contract and the Contractor agrees that the Contract can be terminated if the Contractor knowingly or intentionally fails to comply with a requirement of that subchapter.
Compliance with Applicable Laws and Governing Documents In the performance of its services under this Agreement, the Subadviser shall act in conformity with the Prospectus, SAI and the Trust’s Agreement and Declaration of Trust and By-Laws as currently in effect and, as soon as practical after the Trust, the Fund or the Adviser notifies the Subadviser thereof, as supplemented, amended and/or restated from time to time (referred to hereinafter as the “Declaration of Trust” and “By-Laws,” respectively) and with the instructions and directions received in writing from the Adviser or the Trustees of the Trust and will conform to, and comply with, the requirements of the 1940 Act, the Internal Revenue Code of 1986, as amended (the “Code”), and all other applicable federal and state laws and regulations. Without limiting the preceding sentence, the Adviser promptly shall notify the Subadviser as to any act or omission of the Subadviser hereunder that the Adviser reasonably deems to constitute or to be the basis of any noncompliance or nonconformance with any of the Trust’s Declaration of Trust and By-Laws, the Prospectus and the SAI, the instructions and directions received in writing from the Adviser or the Trustees of the Trust, the 1940 Act, the Code, and all other applicable federal and state laws and regulations. Notwithstanding the foregoing, the Adviser shall remain responsible for ensuring the Fund’s and the Trust’s overall compliance with the 1940 Act, the Code and all other applicable federal and state laws and regulations and the Subadviser is only obligated to comply with this subsection (b) with respect to the Subadviser Assets. The Adviser timely will provide the Subadviser with a copy of the minutes of the meetings of the Board of Trustees of the Trust to the extent they may affect the Fund or the services of the Subadviser, copies of any financial statements or reports made by the Fund to its shareholders, and any further materials or information which the Subadviser may reasonably request to enable it to perform its functions under this Agreement. The Adviser shall perform quarterly and annual tax compliance tests to ensure that the Fund is in compliance with Subchapter M of the Code. In this regard, the Adviser acknowledges that the Subadviser shall rely completely upon the Adviser’s determination of whether and to what extent the Fund is in compliance with Subchapter M of the Code and that the Subadviser has no separate and independent responsibility to test the Fund for such compliance. In connection with such compliance tests, the Adviser shall inform the Subadviser at least ten (10) business days prior to a calendar quarter end if the Subadviser Assets are out of compliance with the diversification requirements under Subchapter M. If the Adviser notifies the Subadviser that the Subadviser Assets are not in compliance with such requirements noted above, the Subadviser will take prompt action to bring the Subadviser Assets back into compliance within the time permitted under the Code thereunder. The Adviser will provide the Subadviser with reasonable advance notice of any change in the Fund’s investment objectives, policies and restrictions as stated in the Prospectus and SAI, and the Subadviser shall, in the performance of its duties and obligations under this Agreement, manage the Subadviser Assets consistent with such changes, provided that the Subadviser has received prompt notice of the effectiveness of such changes from the Trust or the Adviser. In addition to such notice, the Adviser shall provide to the Subadviser a copy of a modified Prospectus and SAI reflecting such changes. The Adviser acknowledges and will ensure that the Prospectus and SAI will at all times be in compliance with all disclosure requirements under all applicable federal and state laws and regulations relating to the Trust or the Fund, including, without limitation, the 1940 Act, and the rules and regulations thereunder, and that the Subadviser shall have no liability in connection therewith, except as to the accuracy of material information furnished in writing by the Subadviser to the Trust or to the Adviser specifically for inclusion in the Prospectus and SAI. The Subadviser hereby agrees to provide to the Adviser in a timely manner such information relating to the Subadviser and its relationship to, and actions for, the Trust as may be required to be contained in the Prospectus, SAI or in the Trust’s Registration Statement on Form N-1A and any amendments thereto.
Safety Requirements The Contractor shall comply with all Federal, State, and local safety laws and regulations applicable to the Work performed under this Agreement.
Personnel Requirements a. The CONTRACTOR shall secure, at the CONTRACTOR'S own expense, all personnel required to perform this Contract. b. The CONTRACTOR shall ensure that the CONTRACTOR'S employees or agents are experienced and fully qualified to engage in the activities and perform the services required under this Contract, and that all applicable licensing and operating requirements imposed or required under federal, state, or county law, and all applicable accreditation and other standards of quality generally accepted in the field of the activities of such employees and agents are complied with and satisfied.
System Requirements Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.
Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.
Compliance with all Applicable Laws and Regulations Grantee must comply with all applicable federal, state and local laws, rules, regulations, and ordinances in administering CRF under this Agreement. Grantee acknowledges that this requirement includes, but is not limited to, compliance with all applicable federal, state, and local health and safety rules and regulations. Grantee’s failure to comply with any part of this provision is material and must be grounds for termination of this Agreement for cause by Florida Housing.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.