Market Risk and Turnover Sample Clauses

Market Risk and Turnover. Other than basic factors that determine the theoretical price of a Warrant, Warrant price are also affected by all prevailing market forces including the demand for and supply of the Warrants. The market forces will be greatest when a Warrant issue is almost sold out and when issuers make further issues of an existing Warrant issue. High turnover should not be regarded as an indication the price of a Warrant will go up. The price of a Warrant is affected by a number of factors in addition to market forces, such as the price of the underlying assets and its volatility, the time remaining to expiry, interest rates and the expected dividend on the underlying assets. 1. Mandatory call risk
AutoNDA by SimpleDocs
Market Risk and Turnover. Other than basic factors that determine the theoretical price of a Warrant, Warrant price are also affected by all prevailing market forces including the demand for and supply of the Warrants. The market forces will be greatest when a Warrant issue is almost sold out and when issuers make further issues of an existing Warrant issue. High turnover should not be regarded as an indication the price of a Warrant will go up. The price of a Warrant is affected by a number of factors in addition to market forces, such as the price of the underlying assets and its volatility, the time remaining to expiry, interest rates and the expected dividend on the underlying assets. SOME ADDITIONAL RISKS INVOLVED IN TRADING CBBCs 1. Mandatory call risk Investors trading CBBCs should be aware of their intraday “knockout” or mandatory call feature. A CBBC will cease trading when the underlying asset value equals the mandatory call price/level as stated in the listing documents. Investors will only be entitled to the residual value of the terminated CBBC as calculated by the product issuer in accordance with the listing documents. Investors should also note that the residual value can be zero. 2. Funding costs The issue price of a CBBC includes funding costs. Funding costs are gradually reduced over time as the CBBC moves towards expiry. The longer the duration of the CBBC, the higher the total funding costs. In the event that a CBBC is called, investors will lose the funding costs for the entire lifespan of the CBBC. The formula for calculating the funding costs are stated in the listing documents.
Market Risk and Turnover. Other than basic factors that determine the theoretical price of a derivative warrant, derivative warrant prices are also affected by all prevailing market forces including the demand for and supply of the derivative warrant. The market forces will be greatest when a derivative warrant issue is almost sold out and when issuers make further issues of an existing derivative warrant issue. High turnover should not be regarded as an indication the price of a derivative warrant will go up. The price of a derivative warrant is affected by a number of factors in addition to market forces, such as the price of the underlying assets and its volatility, the time remaining to expiry, interest rates and the expected dividend on the underlying assets. 除了決定權證理論價格的基本因素外,權證價格亦會受權證本身在市場上的供求影響,尤其權證在市場上快將售罄又或發行商增發權證時。權證成交額高不應認作為其價值會上升,除了市場力量外,權證的價值還受其他因素影響,包括相關資產價格及波幅、剩餘到期時間、利率及預期股息。

Related to Market Risk and Turnover

  • MANAGEMENT OF EVALUATION OUTCOMES 12.1 Where the Employer is, any time during the Employee’s employment, not satisfied with the Employee’s performance with respect to any matter dealt with in this Agreement, the Employer will give notice to the Employee to attend a meeting; 12.2 The Employee will have the opportunity at the meeting to satisfy the Employer of the measures being taken to ensure that his performance becomes satisfactory and any programme, including any dates, for implementing these measures; 12.3 Where there is a dispute or difference as to the performance of the Employee under this Agreement, the Parties will confer with a view to resolving the dispute or difference; and 12.4 In the case of unacceptable performance, the Employer shall – 12.4.1 Provide systematic remedial or developmental support to assist the Employee to improve his performance; and 12.4.2 After appropriate performance counselling and having provided the necessary guidance and/or support as well as reasonable time for improvement in performance, the Employer may consider steps to terminate the contract of employment of the Employee on grounds of unfitness or incapacity to carry out his or her duties.

  • Loop Testing/Trouble Reporting 2.1.6.1 Telepak Networks will be responsible for testing and isolating troubles on the Loops. Telepak Networks must test and isolate trouble to the BellSouth portion of a designed/non-designed unbundled Loop (e.g., UVL-SL2, UCL-D, UVL-SL1, UCL-ND, etc.) before reporting repair to the UNE Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from BellSouth at the time of the trouble report, Telepak Networks will be required to provide the results of the Telepak Networks test which indicate a problem on the BellSouth provided Loop. 2.1.6.2 Once Telepak Networks has isolated a trouble to the BellSouth provided Loop, and had issued a trouble report to BellSouth on the Loop, BellSouth will take the actions necessary to repair the Loop if a trouble actually exists. BellSouth will repair these Loops in the same time frames that BellSouth repairs similarly situated Loops to its End Users. 2.1.6.3 If Telepak Networks reports a trouble on a non-designed or designed Loop and no trouble actually exists, BellSouth will charge Telepak Networks for any dispatching and testing (both inside and outside the CO) required by BellSouth in order to confirm the Loop’s working status. 2.1.6.4 In the event BellSouth must dispatch to the end-user’s location more than once due to incorrect or incomplete information provided by Telepak Networks (e.g., incomplete address, incorrect contact name/number, etc.), BellSouth will xxxx Xxxxxxx Networks for each additional dispatch required to repair the circuit due to the incorrect/incomplete information provided. BellSouth will assess the applicable Trouble Determination rates from BellSouth’s FCC or state tariffs.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Procurement of Small Works Works estimated to cost $250,000 equivalent or less per contract, up to an aggregate amount not to exceed $800,000 equivalent, may be procured under lump-sum, fixed-price contracts awarded on the basis of quotations obtained from three (3) qualified domestic contractors in response to a written invitation. The invitation shall include a detailed description of the works, including basic specifications, the required completion date, a basic form of agreement acceptable to the Bank, and relevant drawings, where applicable. The award shall be made to the contractor who offers the lowest price quotation for the required work, and who has the experience and resources to complete the contract successfully. Part D: Review by the Bank of Procurement Decisions

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Product Warnings As of the Effective Date, all Products CORE sells and/or distributes for sale in California which do not qualify as Reformulated Products, will bear a clear and reasonable warning pursuant to this Section. CORE further agrees that the warning will be prominently placed with such conspicuousness when compared with other words, statements, designs or devices as to render it likely to be read and understood by an ordinary individual under customary conditions of use. For purposes of this Settlement Agreement, a clear and reasonable warning for the Products shall consist of a warning affixed directly to the product or product packaging, label, or tag, for Products sold in California and containing one of the following statements: WARNING: Reproductive Harm- xxx.X00Xxxxxxxx.xx.xxx OR WARNING: This product can expose you to chemicals, including DEHP, which are known to the State of California to cause birth defects or other reproductive harm. For more information go to xxx.X00Xxxxxxxx.xx.xxx

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Periodic Risk Assessment Provider further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!