Collaboration on Compliance and Enforcement A Competent Authority will notify the other Competent Authority when the first-mentioned Competent Authority has reason to believe that an error may have led to incorrect or incomplete information reporting or there is non-compliance by a Reporting Financial Institution with the applicable reporting requirements and due diligence procedures consistent with the Common Reporting Standard. The notified Competent Authority will take all appropriate measures available under its domestic law to address the errors or non-compliance described in the notice.
Compliance and Enforcement 1. These provisions address the additional contractual remedies available to the Airport Board as a result of the Contractor’s failure to comply with the obligations set forth in the M/WBE Program Policy and Administrative Procedures. The contractual remedies set forth are also applicable to the Contractor’s failure to comply with the Program requirements, as well as any remedies available at law or in equity. These remedies are not intended to apply to the Contractor’s failure to comply with other obligations under the Contract unrelated to the Program requirements or preclude Airport Board’s recovery of its actual damages for such unrelatedbreaches. 2. The Contractor must attend and participate in onboarding, progress, non- compliance meetings and site visits upon request. The Contractor must forward all necessary documents and information during the course of performance and to close out the Contract and must cooperate with BDDD in providing any information, including the final accounting for M/WBE participation on the Contract. 3. BDDD is empowered to receive and investigate complaints and allegations by M/WBEs, third parties or Airport Board Staff, or to initiate its own investigations, regarding Contractor’s compliance with the Program requirements. If BDDD determines that an investigation is warranted, the Contractor must fully cooperate with the investigation and provide complete, truthful information to the Airport Board or its representatives concerning the investigation and Contractor’s compliance with the Program requirements. 4. The failure of the Contractor to meet the M/WBE contractual commitment or comply with any other aspect of the Program requirements will constitute a material breach of the Contract entitling the Airport Board or its representatives to exercise any remedy available in this Contract, the Program requirements or applicable law. In addition, the failure of the Contractor to meet the M/WBE contractual commitment or comply with any other aspect of the Program requirements may be considered and have a bearing on future contract award considerations. 5. Any suspected false, fraudulent or dishonest conduct relating to the Contractor’s performance of the Program requirements may be reported to the Airport Board’s Department of Audit Services or to any applicable enforcement agency, including the State Attorney General's Office and appropriate federal law enforcement authorities. 6. If Contractor is in breach of any of the Program requirements, the Airport Board or its representatives may exercise any of following remedies, in addition to any other remedies available to it under this Contract or at law or in equity: a. withholding funds payable under this Contract, including, but not limited to, funds payable for work self-performed by the Contractor or applicable retainage; b. temporarily suspending, at no cost to DFW, Contractor’s performance under the Agreement/Contract; c. termination of the Agreement/Contract; d. suspension/debarment of Contractor for a period of time from participating in any solicitations issued by DFW for severity of breach of Contract. 7. With respect to a firm not meeting a goal on a previous contract or the underutilization of an M/WBE (or SBEs, if applicable) on a previous contract, BDDD shall regard as non-responsive any bid, proposal or competitive selection process proposal received that includes the Contractor, consultant as a Contractor, consultant, subcontractor, subconsultant, joint venture, supplier, manufacturer’s representative, or broker. 8. With respect to M/WBE firms, a finding of non-compliance could result in a denial of certification or removal of eligibility and/or suspension and debarment.
Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.
Monitoring and Enforcement; Termination We have the right to: • Remove or refuse to post any User Contributions for any or no reason in our sole discretion. • Take any action with respect to any User Contribution that we deem necessary or appropriate in our sole discretion, including if we believe that such User Contribution violates the Terms of Use, including the Content Standards, infringes any intellectual property right or other right of any person or entity, threatens the personal safety of users of the Website or the public, or could create liability for the Company. • Disclose your identity or other information about you to any third party who claims that material posted by you violates their rights, including their intellectual property rights or their right to privacy. • Take appropriate legal action, including without limitation, referral to law enforcement, for any illegal or unauthorized use of the Website. • Terminate or suspend your access to all or part of the Website for any or no reason, including without limitation, any violation of these Terms of Use. Without limiting the foregoing, we have the right to fully cooperate with any law enforcement authorities or court order requesting or directing us to disclose the identity or other information of anyone posting any materials on or through the Website. YOU WAIVE AND HOLD HARMLESS THE COMPANY AND ITS AFFILIATES, LICENSEES AND SERVICE PROVIDERS FROM ANY CLAIMS RESULTING FROM ANY ACTION TAKEN BY ANY OF THE FOREGOING PARTIES DURING, OR TAKEN AS A CONSEQUENCE OF, INVESTIGATIONS BY EITHER SUCH PARTIES OR LAW ENFORCEMENT AUTHORITIES. However, we cannot review all material before it is posted on the Website, and cannot ensure prompt removal of objectionable material after it has been posted. Accordingly, we assume no liability for any action or inaction regarding transmissions, communications, or content provided by any user or third party. We have no liability or responsibility to anyone for performance or nonperformance of the activities described in this section. These content standards apply to any and all User Contributions and use of Interactive Services. User Contributions must in their entirety comply with all applicable federal, state, local, and international laws and regulations. Without limiting the foregoing, User Contributions must not: • Contain any material that is defamatory, obscene, indecent, abusive, offensive, harassing, violent, hateful, inflammatory, or otherwise objectionable. • Promote sexually explicit or pornographic material, violence, or discrimination based on race, sex, religion, nationality, disability, sexual orientation, or age. • Infringe any patent, trademark, trade secret, copyright, or other intellectual property or other rights of any other person. • Violate the legal rights (including the rights of publicity and privacy) of others or contain any material that could give rise to any civil or criminal liability under applicable laws or regulations or that otherwise may be in conflict with these Terms of Use and our Privacy Policy. • Be likely to deceive any person. • Promote any illegal activity, or advocate, promote, or assist any unlawful act. • Cause annoyance, inconvenience, or needless anxiety or be likely to upset, embarrass, alarm, or annoy any other person. • Impersonate any person, or misrepresent your identity or affiliation with any person or organization. • Involve commercial activities or sales, such as contests, sweepstakes and other sales promotions, barter, or advertising. • Give the impression that they emanate from or are endorsed by us or any other person or entity, if this is not the case.
Authorization, Enforcement, Compliance with Other Instruments (i) The Company has the requisite corporate power and authority to enter into and perform this Agreement, the Registration Rights Agreement, the Escrow Agreement, the Placement Agent Agreement and any related agreements, in accordance with the terms hereof and thereof, (ii) the execution and delivery of this Agreement, the Registration Rights Agreement, the Escrow Agreement, the Placement Agent Agreement and any related agreements by the Company and the consummation by it of the transactions contemplated hereby and thereby, have been duly authorized by the Company's Board of Directors and no further consent or authorization is required by the Company, its Board of Directors or its stockholders, (iii) this Agreement, the Registration Rights Agreement, the Escrow Agreement, the Placement Agent Agreement and any related agreements have been duly executed and delivered by the Company, (iv) this Agreement, the Registration Rights Agreement, the Escrow Agreement, the Placement Agent Agreement and assuming the execution and delivery thereof and acceptance by the Investor and any related agreements constitute the valid and binding obligations of the Company enforceable against the Company in accordance with their terms, except as such enforceability may be limited by general principles of equity or applicable bankruptcy, insolvency, reorganization, moratorium, liquidation or similar laws relating to, or affecting generally, the enforcement of creditors' rights and remedies.
Governance and Anticorruption The Borrower, the Project Executing Agency, and the implementing agencies shall (a) comply with ADB’s Anticorruption Policy (1998, as amended to date) and acknowledge that ADB reserves the right to investigate directly, or through its agents, any alleged corrupt, fraudulent, collusive or coercive practice relating to the Project; and
Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.
Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.
Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.
Cooperation on forestry matters and environmental protection 1. The aims of cooperation on forestry matters and environmental protection will be, but not limited to, as follows: (a) establishing bilateral cooperation relations in the forestry sector; (b) developing a training program and studies for sustainable management of forests; (c) improving the rehabilitation and sustainable management of forest with the aim of increasing carbon sinks and reduce the impact of climate change in the Asia-Pacific region; (d) cooperating on the execution of national projects, aimed at: improving the management of forest plantations for its transformation for industrial purposes and environmental protection; (e) elaborating studies on sustainable use of timber; (f) developing new technologies for the transformation and processing of timber and non-timber species; and (g) improving cooperation in agro-forestry technologies. 2. To achieve the objectives of the Article 149 (Objectives), the Parties may focus, as a means of cooperation and negotiations on concluding a bilateral agreement on forestry cooperation between the two Parties. Such collaboration will be as follows: (a) exchanges on science and technology as well as policies and laws relating the sustainable use of forest resources; (b) cooperation in training programs, internships, exchange of experts and projects advisory; (c) advice and technical assistance to public institutions and organizations of the Parties on sustainable use of forest resources and environmental protection; (d) facilitating forest policy dialogue and technical cooperation under the Network of Sustainable Forest Management and Forest Rehabilitation in Asia- Pacific Region, initiated at the 15th Asia Pacific Economic Cooperation (APEC) Meeting; (e) encouraging joint studies, working visits, exchange of experiences, among others; and (f) others activities mutually agreed.