Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:
COMPLIANCE WITH GOVERNMENTAL RULES AND REGULATIONS; RECORDS The Trust assumes full responsibility for its compliance with all securities, tax, commodities and other laws, rules and regulations applicable to it.
Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.
Compliance with Governmental Rules and Regulations Except as otherwise provided in the Agreement and except for the accuracy of information furnished to the Fund by Price Services, each Fund assumes full responsibility for the preparation, contents and distribution of its prospectuses and compliance with all applicable requirements of the ’40 Act, the ‘34 Act, the ‘33 Act, and any other laws, rules and regulations of governmental authorities having jurisdiction over the Fund. Price Services shall be responsible for complying with all laws, rules and regulations of governmental authorities having jurisdiction over transfer agents and their activities and cooperating with respect to examinations and requests from such governmental authorities.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Standards of Conduct Whenever the Member is required or permitted to make a decision, take or approve an action, or omit to do any of the foregoing, then the Member shall be entitled to consider only such interests and factors, including its own, as it desires, and shall have no duty or obligation to consider any other interests or factors whatsoever. To the extent that the Member has, at law or in equity, duties (including, without limitation, fiduciary duties) to the Company or other person bound by the terms of this Agreement, the Member acting in accordance with the Agreement shall not be liable to the Company or any such other person for its good faith reliance on the provisions of this Agreement. The provisions of this Agreement, to the extent that they restrict the duties of the Member otherwise existing at law or in equity, replace such other duties to the greatest extent permitted under applicable law.
COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.
Policies, Guidelines, Directives and Standards Either the Funder or the Ministry will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.
Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.
Compliance with Rules and Regulations PFPC undertakes to comply with all applicable requirements of the Securities Laws and any laws, rules and regulations of governmental authorities having jurisdiction with respect to the duties to be performed by PFPC hereunder. Except as specifically set forth herein, PFPC assumes no responsibility for such compliance by the Fund or any other entity.