Independent Crime or Complicity? Sample Clauses

Independent Crime or Complicity?. The tribunals occasionally referred to a superior‟s failure to properly supervise his subordinates as a “dereliction of duty.”121 There is no question, however, that they viewed command responsibility as a mode of participation, not as an independent crime. Once the Medical tribunal concluded that Xxxx Xxxxxx had failed to prevent the euthanasia program, for example, it held that he was “criminally responsible in the program.” 122 Similarly, the Ministries tribunal held Xxxxxxxxxxxx responsible for the Operation Zeppelin executions after finding that he had permitted them to occur.123
AutoNDA by SimpleDocs

Related to Independent Crime or Complicity?

  • No Felony Criminal Convictions Contractor represents that neither Contractor nor any of its employees, agents, or representatives, including any subcontractors and employees, agents, or representative of such subcontractors, have been convicted of a felony criminal offense or that if such a conviction has occurred Contractor has fully advised System Agency in writing of the facts and circumstances surrounding the convictions.

  • Independent Contractor; Authority Notwithstanding the Services provided by the Administrator pursuant to this Agreement, the Administrator shall be deemed to be an independent contractor with respect to the Services. The management, policies and operations of the Parties (including the ultimate approval of the making or disposition of the Painting by the Issuer or Masterworks Cayman, and the terms and conditions thereof) shall be the responsibility of the Parties other than the Administrator.

  • CRIMINAL/CIVIL SANCTIONS 1. Each officer or employee of any person to whom returns or return information is or may be disclosed will be notified in writing by such person that returns or return information disclosed to such officer or employee can be used only for a purpose and to the extent authorized herein, and that further disclosure of any such returns or return information for a purpose or to an extent unauthorized herein constitutes a felony punishable upon conviction by a fine of as much as $5,000 or imprisonment for as long as 5 years, or both, together with the costs of prosecution. Such person shall also notify each such officer and employee that any such unauthorized further disclosure of returns or return information may also result in an award of civil damages against the officer or employee in an amount not less than $1,000 with respect to each instance of unauthorized disclosure. These penalties are prescribed by IRC sections 7213 and 7431 and set forth at 26 CFR 301.6103(n)-1. 2. Each officer or employee of any person to whom returns or return information is or may be disclosed shall be notified in writing by such person that any return or return information made available in any format shall be used only for the purpose of carrying out the provisions of this Contract. Information contained in such material shall be treated as confidential and shall not be divulged or made known in any manner to any person except as may be necessary in the performance of the Contract. Inspection by or disclosure to anyone without an official need to know constitutes a criminal misdemeanor punishable upon conviction by a fine of as much as $1,000 or imprisonment for as long as 1 year, or both, together with the costs of prosecution. Such person shall also notify each such officer and employee that any such unauthorized inspection or disclosure of returns or return information may also result in an award of civil damages against the officer or employee in an amount equal to the sum of the greater of $1,000 for each act of unauthorized inspection or disclosure with respect to which such defendant is found liable or the sum of the actual damages sustained by the plaintiff as a result of such unauthorized inspection or disclosure plus in the case of a willful inspection or disclosure which is the result of gross negligence, punitive damages, plus the costs of the action. These penalties are prescribed by IRC section 7213A and 7431, and set forth at 26 CFR 301.6103(n)-1. 3. Additionally, it is incumbent upon the Contractor to inform its officers and employees of the penalties for improper disclosure imposed by the Privacy Act of 1974, 5 U.S.C. 552a. Specifically, 5 U.S.C. 552a(i)(1), which is made applicable to contractors by 5 U.S.C. 552a(m)(1), provides that any officer or employee of a contractor, who by virtue of his/her employment or official position, has possession of or access to State records which contain individually identifiable information, the disclosure of which is prohibited by the Privacy Act or regulations established thereunder, and who knowing that disclosure of the specific material is prohibited, willfully discloses the material in any manner to any person or agency not entitled to receive it, shall be guilty of a misdemeanor and fined not more than $5,000. 4. Prior to Contractor having access to Federal tax information, Contractor shall certify that each Contractor employee or other individual with access to or who use Federal tax information on Contractor’s behalf pursuant to this Contract understands the State’s security policy and procedures for safeguarding Federal tax information. Contractor’s authorization to access Federal tax information hereunder shall be contingent upon annual recertification. The initial certification and recertification must be documented and placed in the State's files for review. As part of the certification, and at least annually afterwards, Contractor will be advised of the provisions of IRCs 7431, 7213, and 7213A (see IRS Publication 1075 Exhibit 4, Sanctions for Unauthorized Disclosure, and Exhibit 5, Civil Damages for Unauthorized Disclosure). The training provided before the initial certification and annually thereafter must also cover the incident response policy and procedure for reporting unauthorized disclosures and data breaches (See Publication 1075, Section 10). For both the initial certification and the annual certification, the Contractor must sign a confidentiality statement certifying its understanding of the security requirements.

  • Anti-Money Laundering Compliance A. Each of Distributor and Client acknowledges that it is a financial institution subject to the USA PATRIOT Act of 2001 and the Bank Secrecy Act (collectively, the “AML Acts”), which require, among other things, that financial institutions adopt compliance programs to guard against money laundering. Each represents and warrants to the other that it is in compliance with and will continue to comply with the AML Acts and applicable regulations in all relevant respects. B. The Distributor shall include specific contractual provisions regarding anti-money laundering compliance obligations in agreements entered into by the Distributor with any broker-dealer or other financial intermediary that is authorized to effect transactions in Shares of the Funds. C. Each of Distributor and Client agrees that it will take such further steps, and cooperate with the other as may be reasonably necessary, to facilitate compliance with the AML Acts, including but not limited to the provision of copies of its written procedures, policies and controls related thereto (“AML Operations”). Distributor undertakes that it will grant to the Client, the Client’s anti-money laundering compliance officer and appropriate regulatory agencies, reasonable access to copies of Distributor’s AML Operations, and related books and records to the extent they pertain to the Distributor’s services hereunder. It is expressly understood and agreed that the Client and the Client’s compliance officer shall have no access to any of Distributor’s AML Operations, books or records pertaining to other clients or services of Distributor.

  • Requester and Approved User Responsibilities The Requester agrees through the submission of the DAR that the PI named has reviewed and understands the principles for responsible research use and data management of the genomic datasets as defined in the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. The Requester and Approved Users further acknowledge that they are responsible for ensuring that all uses of the data are consistent with national, tribal, and state laws and regulations, as appropriate, as well as relevant institutional policies and procedures for managing sensitive genomic and phenotypic data. The Requester certifies that the PI is in good standing (i.e., no known sanctions) with the institution, relevant funding agencies, and regulatory agencies and is eligible to conduct independent research (i.e., is not a postdoctoral fellow, student, or trainee). The Requester and any Approved Users may use the dataset(s) only in accordance with the parameters described on the study page and in the 1 If contractor services are to be utilized, PI requesting the data must provide a brief description of the services that the contractor will perform for the PI (e.g., data cleaning services) in the research use statement of the DAR. Additionally, the Key Personnel section of the DAR must include the name of the contractor’s employee(s) who will conduct the work. These requirements apply whether the contractor carries out the work at the PI’s facility or at the contractor’s facility. In addition, the PI is expected to include in any contract agreement requirements to ensure that any of the contractor’s employees who have access to the data adhere to the NIH GDS Policy, this Data Use Certification Agreement, and the NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy. Note that any scientific collaborators, including contractors, who are not at the Requester must submit their own DAR. Addendum to this Agreement for the appropriate research use, as well as any limitations on such use, of the dataset(s), as described in the DAR, and as required by law. Through the submission of this DAR, the Requester and Approved Users acknowledge receiving and reviewing a copy of the Addendum which includes Data Use Limitation(s) for each dataset requested. The Requester and Approved Users agree to comply with the terms listed in the Addendum. Through submission of the DAR, the PI and Requester agree to submit a Project Renewal or Project Close-out prior to the expiration date of the one (1) year data access period. The PI also agrees to submit an annual Progress Update prior to the one (1) year anniversary2 of the project, as described under Research Use Reporting (Term 10) below. By approving and submitting the attached DAR, the Institutional Signing Official provides assurance that relevant institutional policies and applicable local, state, tribal, and federal laws and regulations, as applicable, have been followed, including IRB approval, if required. Approved Users may be required to have IRB approval if they have access to personal identifying information for research participants in the original study at their institution, or through their collaborators. The Institutional Signing Official also assures, through the approval of the DAR, that other institutional departments with relevant authorities (e.g., those overseeing human subjects research, information technology, technology transfer) have reviewed the relevant sections of the NIH GDS Policy and the associated procedures and are in agreement with the principles defined. The Requester acknowledges that controlled-access datasets subject to the NIH GDS Policy may be updated to exclude or include additional information. Unless otherwise indicated, all statements herein are presumed to be true and applicable to the access and use of all versions of these datasets.

  • Independent Contractor Status The Sub-Adviser shall for all purposes hereof be deemed to be an independent contractor and shall, unless otherwise provided or authorized, have no authority to act for or represent the Trust or the Adviser in any way or otherwise be deemed an agent of the Fund or the Adviser.

  • Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.

  • Notice of Criminal Activity and Disciplinary Actions a. Xxxxxxx shall immediately report in writing to their contract manager when Xxxxxxx has knowledge or any reason to believe that they or any person with ownership or controlling interest in the organization/business, or their agent, employee, contractor or volunteer that is providing services under this Contract has: 1. Engaged in any activity that could constitute a criminal offense equal to or greater than a Class A misdemeanor or grounds for disciplinary action by a state or federal regulatory authority; or 2. Been placed on community supervision, received deferred adjudication, or been indicted for or convicted of a criminal offense relating to involvement in any financial matter, federal or state program or felony sex crime. b. Grantee shall not permit any person who engaged, or was alleged to have engaged, in any activity subject to reporting under this section to perform direct client services or have direct contact with clients, unless otherwise directed in writing by the System Agency.

  • Lobbying Activities - Standard Form - LLL No response Do not upload this form unless Vendor has reportable lobbying activities. There are Attributes entitled, “2 CFR Part 200 or Federal Provision - Xxxx Anti-Lobbying Amendment – Continued.” Properly respond to those Attributes and only upload this form if applicable/instructed. If upload is required based on your response to those Attributes, the Disclosure of Lobbying Activities – Standard Form - LLL must be downloaded from the “Attachments” section of the IonWave eBid System, reviewed, properly completed, and uploaded to this location.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!