We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Personal Interest Checking and Personal and Business Non-Interest Checking/ Accounting Procedures Sample Clauses

Personal Interest Checking and Personal and Business Non-Interest Checking/ Accounting Procedures. For regulatory accounting purposes, your account may be divided into two

Related to Personal Interest Checking and Personal and Business Non-Interest Checking/ Accounting Procedures

  • FORMAT AND CONTENT FOR REGISTRY OPERATOR MONTHLY REPORTING Registry Operator shall provide one set of monthly reports per gTLD, using the API described in draft-­‐xxxxxx-­‐icann-­‐registry-­‐interfaces, see Specification 2, Part A, Section 9, reference 5, with the following content. ICANN may request in the future that the reports be delivered by other means and using other formats. ICANN will use reasonable commercial efforts to preserve the confidentiality of the information reported until three (3) months after the end of the month to which the reports relate. Unless set forth in this Specification 3, any reference to a specific time refers to Coordinated Universal Time (UTC). Monthly reports shall consist of data that reflects the state of the registry at the end of the month (UTC).

  • Additional Accounting Services Ultimus shall also perform the following additional accounting services for each Portfolio: (i) Provide monthly (or as frequently as may reasonably be requested by the Trust or a Portfolio's investment adviser) a set of financial statements for each Portfolio as described below, upon request of the Trust: Statement of Assets and Liabilities Statement of Operations Statement of Changes in Net Assets Security Purchases and Sales Journals Portfolio Holdings Reports (ii) Provide accounting information for the following: (A) federal and state income tax returns and federal excise tax returns; (B) the Trust's semi-annual reports with the SEC on Form N-SAR; (C) the Trust's annual, semi-annual and quarterly (if any) shareholder reports; (D) registration statements on Form N-1A and other filings relating to the registration of shares; (E) Ultimus' monitoring of the Trust's status as a regulated investment company under Subchapter M of the Internal Revenue Code, as amended; (F) annual audit by the Trust's auditors; and (G) examinations performed by the SEC.

  • Books and Records Accounting Tax Matters Describes general and administrative items and procedural aspects of handling certain of those items.

  • Books and Records; Certain Funds Received After the Cut-Off Date From and after the sale of the Mortgage Loans to the Purchaser, record title to each Mortgage (other than with respect to any Outside Serviced Mortgage Loan) and each Note shall be transferred to the Trustee subject to and in accordance with this Agreement. Any funds due after the Cut-Off Date in connection with a Mortgage Loan received by the Seller shall be held in trust on behalf of the Trustee (for the benefit of the Certificateholders) as the owner of such Mortgage Loan and shall be transferred promptly to the Certificate Administrator. All scheduled payments of principal and interest due on or before the Cut-Off Date but collected after the Cut-Off Date, and all recoveries and payments of principal and interest collected on or before the Cut-Off Date (only in respect of principal and interest on the Mortgage Loans due on or before the Cut-Off Date and principal prepayments thereon), shall belong to, and shall be promptly remitted to, the Seller. The transfer of each Mortgage Loan shall be reflected on the Seller’s balance sheets and other financial statements as the sale of such Mortgage Loan by the Seller to the Purchaser. The Seller intends to treat the transfer of each Mortgage Loan to the Purchaser as a sale for tax purposes. Following the transfer of the Mortgage Loans by the Seller to the Purchaser, the Seller shall not take any actions inconsistent with the ownership of the Mortgage Loans by the Purchaser and its assignees. The transfer of each Mortgage Loan shall be reflected on the Purchaser’s balance sheets and other financial statements as the purchase of such Mortgage Loan by the Purchaser from the Seller. The Purchaser intends to treat the transfer of each Mortgage Loan from the Seller as a purchase for tax purposes. The Purchaser shall be responsible for maintaining, and shall maintain, a set of records for each Mortgage Loan which shall be clearly marked to reflect the transfer of ownership of each Mortgage Loan by the Seller to the Purchaser pursuant to this Agreement. It is expressly agreed and understood that, notwithstanding the assignment of the Loan Documents, it is expressly intended that the Seller will receive the benefit of any securitization indemnification provisions in the Loan Documents.

  • Duties of Custodian with Respect to the Books of Account and Calculation of Net Asset Value and Net Income The Custodian shall cooperate with and supply necessary information to the entity or entities appointed by the applicable Board to keep the books of account of each Portfolio and/or compute the net asset value per Share of the outstanding Shares or, if directed in writing to do so by a Fund on behalf of a Portfolio, shall itself keep such books of account and/or compute such net asset value per Share. If so directed, the Custodian shall also calculate daily the net income of the Portfolio as described in the Prospectus and shall advise the Fund and the Transfer Agent daily of the total amounts of such net income and, if instructed in writing by an officer of the Fund to do so, shall advise the Transfer Agent periodically of the division of such net income among its various components. Each Fund acknowledges and agrees that, with respect to investments maintained with the Underlying Transfer Agent, the Underlying Transfer Agent is the sole source of information on the number of shares of a fund held by it on behalf of a Portfolio and that the Custodian has the right to rely on holdings information furnished by the Underlying Transfer Agent to the Custodian in performing its duties under this Agreement, including without limitation, the duties set forth in this Section 10 and in Section 11 hereof; provided, however, that the Custodian shall be obligated to reconcile information as to purchases and sales of Underlying Shares contained in trade instructions and confirmations received by the Custodian and to report promptly any discrepancies to the Underlying Transfer Agent. The calculations of the net asset value per Share and the daily income of each Portfolio shall be made at the time or times described from time to time in the Prospectus. Each Fund acknowledges that, in keeping the books of account of the Portfolio and/or making the calculations described herein with respect to Portfolio property released and delivered pursuant to Section 2.2(14), or purchased pursuant to Section 2.6(7) hereof, the Custodian is authorized and instructed to rely upon information provided to it by the Fund, the Fund’s counterparty(ies), or the agents of either of them.

  • Books Records Accounting and Reports Section 8.1 Records and Accounting 60 Section 8.2 Fiscal Year 60 Section 8.3 Reports 60

  • Payment of Checks, Drafts and Orders Subject to Section 9.5, the Assuming Institution agrees to pay all properly drawn checks, drafts and withdrawal orders of depositors of the Failed Bank presented for payment, whether drawn on the check or draft forms provided by the Failed Bank or by the Assuming Institution, to the extent that the Deposit balances to the credit of the respective makers or drawers assumed by the Assuming Institution under this Agreement are sufficient to permit the payment thereof, and in all other respects to discharge, in the usual course of conducting a banking business, the duties and obligations of the Failed Bank with respect to the Deposit balances due and owing to the depositors of the Failed Bank assumed by the Assuming Institution under this Agreement.

  • Control and Payment of Subordinates; Independent Contractor The Services shall be performed by Consultant or under its supervision. Consultant will determine the means, methods and details of performing the Services subject to the requirements of this Agreement. City retains Consultant on an independent contractor basis and not as an employee. Consultant retains the right to perform similar or different services for others during the Term of this Agreement. Any additional personnel performing the Services under this Agreement on behalf of Consultant shall also not be employees of City and shall at all times be under Consultant’s exclusive direction and control. Consultant shall pay all wages, salaries, and other amounts due such personnel in connection with their performance of Services under this Agreement and as required by law. Consultant shall be responsible for all reports and obligations respecting such additional personnel, including, but not limited to: social security taxes, income tax withholding, unemployment insurance, disability insurance, and workers’ compensation insurance.

  • Responsibilities of Business Associate Business Associate agrees:

  • Obligations and Activities of Business Associates (1) Business Associate agrees not to use or disclose PHI other than as permitted or required by this Section of the Contract or as Required by Law. (2) Business Associate agrees to use and maintain appropriate safeguards and comply with applicable HIPAA Standards with respect to all PHI and to prevent use or disclosure of PHI other than as provided for in this Section of the Contract and in accordance with HIPAA Standards. (3) Business Associate agrees to use administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of electronic Protected Health Information that it creates, receives, maintains, or transmits on behalf of the Covered Entity. (4) Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to the Business Associate of a use or disclosure of PHI by Business Associate in violation of this Section of the Contract. (5) Business Associate agrees to report to Covered Entity any use or disclosure of PHI not provided for by this Section of the Contract or any Security Incident of which it becomes aware. (6) Business Associate agrees, in accordance with 45 C.F.R. 502(e)(1)(ii) and 164.308(d)(2), if applicable, to ensure that any subcontractors that create, receive, maintain or transmit PHI on behalf of the Business Associate, agree to the same restrictions, conditions, and requirements that apply to the business associate with respect to such information. (7) Business Associate agrees to provide access (including inspection, obtaining a copy or both), at the request of the Covered Entity, and in the time and manner designated by the Covered Entity, to PHI in a Designated Record Set, to Covered Entity or, as directed by Covered Entity, to an Individual in order to meet the requirements under 45 C.F.R. § 164.524. Business Associate shall not charge any fees greater than the lesser of the amount charged by the Covered Entity to an Individual for such records; the amount permitted by state law; or the Business Associate’s actual cost of postage, labor and supplies for complying with the request. (8) Business Associate agrees to make any amendments to PHI in a Designated Record Set that the Covered Entity directs or agrees to pursuant to 45 C.F.R. § 164.526 at the request of the Covered Entity, and in the time and manner designated by the Covered Entity. (9) Business Associate agrees to make internal practices, books, and records, including policies and procedures and PHI, relating to the use and disclosure of PHI received from, or created, maintained, transmitted or received by, Business Associate on behalf of Covered Entity, available to Covered Entity or to the Secretary in a time and manner agreed to by the parties or designated by the Secretary, for purposes of the Secretary investigating or determining Covered Entity’s compliance with the HIPAA Standards. (10) Business Associate agrees to document such disclosures of PHI and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. (11) Business Associate agrees to provide to Covered Entity, in a time and manner designated by the Covered Entity, information collected in accordance with subsection (g)(10) of this Section of the Contract, to permit Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. Business Associate agrees at the Covered Entity’s direction to provide an accounting of disclosures of PHI directly to an individual in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. (12) Business Associate agrees to comply with any State or federal law that is more stringent than the Privacy Rule. (13) Business Associate agrees to comply with the requirements of the HITECH Act relating to privacy and security that are applicable to the Covered Entity and with the requirements of 45 C.F.R. §§ 164.504(e), 164.308, 164.310, 164.312, and 164.316. (14) In the event that an Individual requests that the Business Associate (A) restrict disclosures of PHI; (B) provide an accounting of disclosures of the Individual’s PHI; (C) provide a copy of the Individual’s PHI in an Electronic Health Record; or (D) amend PHI in the Individual’s Designated Record Set the Business Associate agrees to notify the Covered Entity, in writing, within five Days of the request. (15) Business Associate agrees that it shall not, and shall ensure that its subcontractors do not, directly or indirectly, receive any remuneration in exchange for PHI of an Individual without (A) the written approval of the Covered Entity, unless receipt of remuneration in exchange for PHI is expressly authorized by this Contract and (B) the valid authorization of the Individual, except for the purposes provided under section 13405(d)(2) of the HITECH Act, (42 U.S.C. § 17935(d)(2)) and in any accompanying regulations. (16) Obligations in the Event of a Breach. (A) The Business Associate agrees that, following the discovery by the Business Associate or by a subcontractor of the Business Associate of any use or disclosure not provided for by this section of the Contract, any breach of Unsecured protected health information, or any Security Incident, it shall notify the Covered Entity of such Breach in accordance with Subpart D of Part 164 of Title 45 of the Code of Federal Regulations and this Section of the Contract. (B) Such notification shall be provided by the Business Associate to the Covered Entity without unreasonable delay, and in no case later than 30 days after the Breach is discovered by the Business Associate, or a subcontractor of the Business Associate, except as otherwise instructed in writing by a law enforcement official pursuant to 45 C.F.R. 164.412. A Breach is considered discovered as of the first day on which it is, or reasonably should have been, known to the Business Associate or its subcontractor. The notification shall include the identification and last known address, phone number and email address of each Individual (or the next of kin of the individual if the Individual is deceased) whose Unsecured protected health information has been, or is reasonably believed by the Business Associate to have been, accessed, acquired, or disclosed during such Breach. (C) The Business Associate agrees to include in the notification to the Covered Entity at least the following information: 1. A description of what happened, including the date of the Breach; the date of the discovery of the Breach; the unauthorized person, if known, who used the PHI or to whom it was disclosed; and whether the PHI was actually acquired or viewed. 2. A description of the types of Unsecured protected health information that were involved in the Breach (such as full name, Social Security number, date of birth, home address, account number, or disability code). 3. The steps the Business Associate recommends that Individual(s) take to protect themselves from potential harm resulting from the Breach. 4. A detailed description of what the Business Associate is doing or has done to investigate the Breach, to mitigate losses, and to protect against any further Breaches. 5. Whether a law enforcement official has advised the Business Associate, either verbally or in writing, that he or she has determined that notification or notice to Individuals or the posting required under 45 C.F.R.