Predatory Lending Regulations; High Cost Loans None of the Mortgage Loans are classified as (a) “high cost” loans under the Home Ownership and Equity Protection Act of 1994 or (b) “high cost,” “threshold,” “predatory” or “covered” loans or “High Cost Home Loans” under any other applicable state, federal or local law (or a similarly classified loan using different terminology under a law imposing heightened regulatory scrutiny or additional legal liability for residential mortgage loans having high interest rates, points and/or fees);
Business Travel, Lodging, etc Employer shall reimburse Executive for reasonable travel, lodging, meal and other reasonable expenses incurred by him/her in connection with his/her performance of services hereunder upon submission of evidence, satisfactory to Employer, of the incurrence and purpose of each such expense and otherwise in accordance with Employer’s business travel reimbursement policy applicable to its senior executives as in effect from time to time.
Soldiers' and Sailors' Civil Relief Act The Mortgagor has not notified the Seller, and the Seller has no knowledge of any relief requested or allowed to the Mortgagor under the Relief Act or any similar state statute;
FUNERAL LEAVE Section 30.1 In the event of the death of a parent, spouse, child, sister, brother, mother-in- law, father-in-law, son-in-law, daughter-in-law, grandparent of the Employee or spouse, grandchild of the Employee, or “xxxxxx” or “step” situations within these relationships, the Employee shall be allowed a leave of absence with pay of two (2) consecutive (eight or ten hour) workdays.
Boiler and Machinery Insurance The Owner shall have the option of purchasing and maintaining boiler and machinery insurance required by the Contract Documents or by law, which shall specifically cover such insured objects during installation and until final acceptance by the Owner. If purchased this insurance shall include interests of the Owner, Contractor, Subcontractors and Sub-subcontrators in the Work.
Cost 5.2.1.2. Ability to meet completion dates in proposed project schedule
Replacement Cost The term “full replacement cost” as used herein shall mean the actual replacement cost of the Leased Property requiring replacement from time to time including an increased cost of construction endorsement, if available, and the cost of debris removal. In the event either party believes that full replacement cost (the then-replacement cost less such exclusions) has increased or decreased at any time during the Lease Term, it shall have the right to have such full replacement cost re-determined.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.