We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Other Requirements as to Policies Sample Clauses

Other Requirements as to Policies 

Related to Other Requirements as to Policies

  • Other Requirements AVIF will require that each Participating Insurance Company and Participating Plan enter into an agreement with AVIF that contains in substance the same provisions as are set forth in Sections 4.1(b), 4.1(d), 4.3(a), 4.4(b), 4.5(a), 5, and 10 of this Agreement.

  • Compliance with Rules and Policies The Executive shall perform all services in accordance with the lawful policies, procedures and rules established by the Company and the Board. In addition, the Executive shall comply with all laws, rules and regulations that are generally applicable to the Company or its subsidiaries and their respective employees, directors and officers.

  • Compliance with Laws and Rules Applicant shall comply with all statutes, regulations, and ordinances of all local, state and federal jurisdictions concerning the use of the Property. In addition, the City shall have the right to adopt reasonable rules concerning the use of the Property and Applicant shall comply with the rules.

  • Imposition of Other Requirements The Company reserves the right to impose other requirements on the Participant’s participation in the Plan, on the RSUs and on any Shares acquired under the Plan, to the extent the Company determines it is necessary or advisable for legal or administrative reasons, and to require the Participant to sign any additional agreements or undertakings that may be necessary to accomplish the foregoing.

  • General Policies 9.6.1 Each Party’s resources are for approved this Agreement’s business purposes only. 9.6.2 Each Party may exercise at any time its right to inspect, record, and/or remove all information contained in its systems, and take appropriate action should unauthorized or improper usage be discovered. 9.6.3 Individuals will only be given access to resources that they are authorized to receive and which they need to perform their job duties. Users must not attempt to access resources for which they are not authorized. 9.6.4 Authorized users shall not develop, copy or use any program or code which circumvents or bypasses system security or privilege mechanism or distorts accountability or audit mechanisms. 9.6.5 Actual or suspected unauthorized access events must be reported immediately to each Party’s security organization or to an alternate contact identified by that Party. Each Party shall provide its respective security contact information to the other.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance with Laws and Other Requirements (A) Except as otherwise provide herein and in the Work Letter, Tenant shall cause the Premises to comply in all material respects with all laws, ordinances, regulations and directives of any governmental authority having jurisdiction including, without limitation, any certificate of occupancy and any law, ordinance, regulation, covenant, condition or restriction affecting the Building or the Premises which in the future may become applicable to the Premises. (B) Tenant shall not use the Premises, or permit the Premises to be used, in any manner which: (i) violates any Applicable Law; (ii) causes or is reasonably likely to cause damage to the Building or the Premises; (iii) violates a requirement or condition of any fire and extended insurance policy covering the Building and/or the Premises, or increases the cost of such policy; (iv) constitutes or is reasonably likely to constitute a nuisance, annoyance or inconvenience to other tenants or occupants of the Building or its equipment, facilities or systems; (v) interferes with, or is reasonably likely to interfere with, the transmission or reception of microwave, television, radio, telephone or other communication signals by antennae or other facilities located in the Building; or (vi) violates the Rules and Regulations described in Article XIX. (C) Tenant shall not place a load upon any floor of the Premises exceeding the floor load per square foot area which such floor was designed to carry and which may be allowed by law. Landlord reserves the right to prescribe the weight and position of all heavy equipment and similar items, and to prescribe the reinforcing necessary, if any, which in the opinion of Landlord may be required under the circumstances, such reinforcing to be at Tenant’s prepaid expense. (D) The parties acknowledge that safety and security devices, services and programs provided by Landlord, if any, while intended to deter crime and ensure safety, may not in given instances prevent theft or other criminal acts, or ensure safety of persons or property. The risk that any safety or security device, service or program may not be effective, or may malfunction, or be circumvented by a criminal, is assumed by Tenant with respect to Tenant’s property and interests, and Tenant shall obtain insurance coverage to the extent Tenant desires protection against such criminal acts and other losses, as further described in this Lease. Tenant agrees to cooperate in any reasonable safety or security program developed by Landlord or required by Law. (E) Landlord shall be responsible, at its cost and expense and not as an Operating Expense, for all code compliance work (i) to the common areas of the Building, if any, including but not limited to the path of travel, common area bathrooms fixtures, drinking fountains and required seismic upgrades and (ii) required to comply with any laws or other governmental requirements enacted (or with respect to the ADA only, as interpreted or enforced) as of the date of this Lease. (F) Notwithstanding anything to the contrary herein, Tenant shall not be required to comply with or cause the Premises to comply with any laws, rules, regulations or insurance requirements requiring the construction of alterations unless such compliance is necessitated solely due to Tenant’s particular use of the Premises.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Compliance with Policies Each Individual Limited Partner hereby agrees that he shall comply with all policies and procedures adopted by any member of the Och-Ziff Group or which Limited Partners are required to observe by law, or by any recognized stock exchange, or other regulatory body or authority.

  • Compliance with Laws and Policies In carrying out the terms of this Agreement, both Parties shall comply with all applicable federal, state and local laws, regulations and rules, DSRIP Requirements, and the CNYCC Compliance Program.