Program Bank Exclusions Sample Clauses

Program Bank Exclusions. UMB will not allocate your funds to any Program Bank that is on your then-effective opt-out list from Program Banks that are eligible to receive your funds through the Program (your “Opt-Out List”). You acknowledge that as of the time you open the Customer Account, all Program Banks are eligible. At any time after you open the Customer Account, you may add or delete depository institutions to or from your Opt-Out List by contacting UNIFIMONEY at Xxxxxxx@xxxxx.xxxxx, who will provide data to UMB in the manner it specifies. If you add an exclusion in this manner, the new exclusion will be effective within one (1) Business Day after the first Business Day on which UMB has received notice.
AutoNDA by SimpleDocs

Related to Program Bank Exclusions

  • GENERAL EXCLUSIONS We do not insure for loss caused directly or indirectly by any of the following. Such loss is excluded regardless of any other cause or event contributing concurrently or in any sequence to the loss. These exclusions apply whether or not the loss event results in widespread damage or affects a substantial area.

  • Related Exclusions This agreement does NOT cover custodial care, respite care, day care, or care in a facility that is not approved by us. See

  • Additional Exclusions A Receiving Party will not violate its confidentiality obligations if it discloses the Disclosing Party’s Confidential Information if required by applicable laws, including by court subpoena or similar instrument so long as the Receiving Party provides the Disclosing Party with written notice of the required disclosure so as to allow the Disclosing Party to contest or seek to limit the disclosure or obtain a protective order. If no protective order or other remedy is obtained, the Receiving Party will furnish only that portion of the Confidential Information that is legally required, and agrees to exercise reasonable efforts to ensure that confidential treatment will be accorded to the Confidential Information so disclosed.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Wall Street Transparency and Accountability Act In connection with Section 739 of the Wall Street Transparency and Accountability Act of 2010 (“WSTAA”), the parties hereby agree that neither the enactment of WSTAA or any regulation under the WSTAA, nor any requirement under WSTAA or an amendment made by WSTAA, shall limit or otherwise impair either party’s otherwise applicable rights to terminate, renegotiate, modify, amend or supplement this Confirmation or the Agreement, as applicable, arising from a termination event, force majeure, illegality, increased costs, regulatory change or similar event under this Confirmation, the Equity Definitions incorporated herein, or the Agreement (including, but not limited to, rights arising from Change in Law, Hedging Disruption, Increased Cost of Hedging, an Excess Ownership Position, or Illegality (as defined in the Agreement)).

  • Acts of Terrorism Exclusion With respect to each Mortgage Loan over $20 million, as of origination the related special-form all-risk insurance policy and business interruption policy (issued by an insurer meeting the Insurance Rating Requirements) do not specifically exclude Acts of Terrorism, as defined in the Terrorism Risk Insurance Act of 2002, as amended by the Terrorism Risk Insurance Program Reauthorization Act of 2007 and the Terrorism Risk Insurance Program Reauthorization Act of 2015 (collectively referred to as “TRIPRA”), from coverage, or if such coverage is excluded, it is covered by a separate terrorism insurance policy. With respect to each Mortgage Loan, the related Mortgage Loan documents do not expressly waive or prohibit the Mortgagee from requiring coverage for Acts of Terrorism, as defined in TRIPRA, or damages related thereto, except to the extent that any right to require such coverage may be limited by commercial availability on commercially reasonable terms, or as otherwise indicated on Schedule C; provided, that if TRIPRA or a similar or subsequent statute is not in effect, then, provided that terrorism insurance is commercially available, the Mortgagor under each Mortgage Loan is required to carry terrorism insurance, but in such event the Mortgagor shall not be required to spend on terrorism insurance coverage more than two times the amount of the insurance premium that is payable in respect of the property and business interruption/rental loss insurance required under the related Mortgage Loan documents (without giving effect to the cost of terrorism and earthquake components of such casualty and business interruption/rental loss insurance) at the time of the origination of the Mortgage Loan, and if the cost of terrorism insurance exceeds such amount, the Mortgagor is required to purchase the maximum amount of terrorism insurance available with funds equal to such amount.

  • DISCLAIMERS; EXCLUSIONS; LIMITATIONS Subject to §4, neither party makes any warranties (express, implied, or otherwise), including implied warranties of merchantability, non-infringement, fitness for a particular purpose, or title, related to its performance or anything else provided under this Agreement. Neither party will be liable for any special, incidental, punitive, or consequential damages of any kind for any reason whatsoever relating to this Agreement, even if such damages were reasonably foreseeable.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

  • WILD AND SCENIC RIVERS The Wild and Scenic Rivers Act of 1968 (16 U.S.C. § 1271, et seq.) as amended, particularly sections 7(b) and (c) (16 U.S.C. § 1278(b) and (c)). AIR QUALITY The Clean Air Act (42 U.S.C. § 7401, et seq.) as amended, particularly sections 176(c) and (d) (42 U.S.C. §7506(c) and (d)). Determining Conformity of Federal Actions to State or Federal Implementation Plans (Environmental Protection Agency-40 C.F.R. Parts 6, 51, and 93).

  • Wall Street Transparency and Accountability Act of 2010 The parties hereby agree that none of (i) Section 739 of the WSTAA, (ii) any similar legal certainty provision included in any legislation enacted, or rule or regulation promulgated, on or after the Trade Date, (iii) the enactment of the WSTAA or any regulation under the WSTAA, (iv) any requirement under the WSTAA or (v) any amendment made by the WSTAA shall limit or otherwise impair either party’s right to terminate, renegotiate, modify, amend or supplement this Confirmation or the Agreement, as applicable, arising from a termination event, force majeure, illegality, increased cost, regulatory change or similar event under this Confirmation, the Equity Definitions or the Agreement (including, but not limited to, any right arising from any Acceleration Event).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!