Monitoring and Institutionalisation Sample Clauses

Monitoring and Institutionalisation. PETS initiatives, especially those that arrive as one-of experiments will serve little long- term purpose unless implementation is followed through on a sustained basis. Ideally, citizens monitor if local governments use results from expenditure tracking to initiate reforms in public expenditure management. Tracking exercises institutionalised at the community level can also be linked with participatory planning and budgeting of services. Institutionalization of PETS can take a variety of forms depending on local circumstances. Some models can be: • independent civil society organizations undertake the initiative in partnership with external organizations (Uganda) • governments monitor their own performance as part of ongoing public sector reforms • an oversight agency such as the Auditing Bureau undertakes the initiative to monitor flow of public money.
AutoNDA by SimpleDocs

Related to Monitoring and Institutionalisation

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Child Support Compliance Act If the Contract Amount is $100,000 or more, this section is applicable. Contractor recognizes the importance of child and family support obligations and fully complies with (and will continue to comply with during the Term) all applicable state and federal laws relating to child and family support enforcement, including disclosure of information and compliance with earnings assignment orders, as provided in Family Code section 5200 et seq. Contractor provides the names of all new employees to the New Hire Registry maintained by the California Employment Development Department.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Monitoring and Risk Assessment of Securities Depositories Prior to the placement of any assets of the Fund with a non-U.S. Securities Depository, the Custodian: (a) shall provide to the Fund or its authorized representative an assessment of the custody risks associated with maintaining assets within such Securities Depository; and (b) shall have established a system to monitor the custody risks associated with maintaining assets with such Securities Depository on a continuing basis and to promptly notify the Fund or its Investment Adviser of any material changes in such risk. In performing its duties under this subsection, the Custodian shall use reasonable care and may rely on such reasonable sources of information as may be available including but not limited to: (i) published ratings; (ii) information supplied by a Subcustodian that is a participant in such Securities Depository; (iii) industry surveys or publications; (iv) information supplied by the depository itself, by its auditors (internal or external) or by the relevant Foreign Financial Regulatory Authority. It is acknowledged that information procured through some or all of these sources may not be independently verifiable by the Custodian and that direct access to Securities Depositories is limited under most circumstances. Accordingly, the Custodian shall not be responsible for errors or omissions in its duties hereunder provided that it has performed its monitoring and assessment duties with reasonable care. The risk assessment shall be provided to the Fund or its Investment Advisor by such means as the Custodian shall reasonably establish. Advices of material change in such assessment may be provided by the Custodian in the manner established as customary between the Fund and the Custodian for transmission of material market information.

  • Traffic Management 9.2.1 During the Operating Period, Developer shall be responsible for the general management of traffic on the Project. Developer shall manage traffic so as to preserve and protect safety of traffic on the Project and Related Transportation Facilities and, to the maximum extent practicable, to avoid disruption, interruption or other adverse effects on traffic flow, throughput or level of service on the Project and Related Transportation Facilities. Developer shall conduct traffic management in accordance with all applicable Technical Provisions, Technical Documents, Laws and Governmental Approvals, and in accordance with the Traffic Management Plan. 9.2.2 Developer shall prepare and submit to TxDOT and the Independent Engineer for TxDOT approval a Traffic Management Plan for managing traffic on the Project and Related Transportation Facilities after the commencement of traffic operations on any portion of the Project, addressing (a) orderly and safe movement and diversion of traffic on Related Transportation Facilities during Project construction, (b) orderly and safe movement of traffic on the Project and (c) orderly and safe diversion of traffic on the Project and Related Transportation Facilities necessary in connection with field maintenance and repair work or Renewal Work or in response to Incidents, Emergencies and lane closures. Developer shall prepare the Traffic Management Plan according to the schedule set forth in the Technical Provisions. The Traffic Management Plan shall comply with the Technical Provisions and Technical Documents concerning traffic management and traffic operations. Developer shall carry out all traffic management during the Term in accordance with the approved Traffic Management Plan. 9.2.3 Developer shall implement the Traffic Management Plan to promote safe and efficient operation of the Project and Related Transportation Facilities at all times during the course of any construction or operation of the Project and during the Utility Adjustment Work. 9.2.4 TxDOT shall have at all times, without obligation or liability to Developer, the right 9.2.4.1 Issue Directive Letters to Developer regarding traffic management 9.2.4.2 Provide on the Project, via message signs or other means consistent with Good Industry Practice, non-Discriminatory traveler and driver information, and other public information (e.g. amber alerts), provided that the means to disseminate such information does not materially interfere with the functioning of the ETCS.

  • Institution and Investigator acknowledge and agree that its, his or her judgment with respect to its, his or her advice to and care of each Subject is not and shall not be affected by the compensation Institution and/or Investigator receive in accordance with the Study.

  • Procurement from UN Agencies Goods estimated to cost less than $100,000 equivalent per contract may be procured directly from Inter-Agency Procurement Services Office (IAPSO) in accordance with the provisions of paragraphs 3.1 and 3.9 of the Procurement Guidelines.

  • Compliance with Applicable Anti-Terrorism and Anti-Money Laundering Regulations In order to comply with laws, rules and regulations applicable to banking institutions, including those relating to the funding of terrorist activities and money laundering, the Indenture Trustee is required to obtain, verify and record certain information relating to individuals and entities which maintain a business relationship with the Indenture Trustee. Accordingly, each of the parties hereto agrees to provide to the Indenture Trustee upon its request from time to time such identifying information and documentation as may be available for such party in order to enable the Indenture Trustee to comply with applicable law.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • PROCUREMENT LOBBYING To the extent this agreement is a "procurement contract" as defined by State Finance Law Sections 139-j and 139-k, by signing this agreement the contractor certifies and affirms that all disclosures made in accordance with State Finance Law Sections 139-j and 139-k are complete, true and accurate. In the event such certification is found to be intentionally false or intentionally incomplete, the State may terminate the agreement by providing written notification to the Contractor in accordance with the terms of the agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!