Property Preservation Population Sample Clauses

Property Preservation Population. The Property Preservation Population shall mean borrowers whose property was (i) subject to a property inspection by Nationstar, or its agent, and (ii) was determined to be vacant, and (iii) as a result of that determination Nationstar or its agent changed the lock on the property between and including June 24, 2011 and December 29, 2017, and (iv) either within 30 days of the initial lock change the borrower requested access to the property, or within 90 days of the initial lock change the property was reported as occupied through a subsequent inspection, and (v) which otherwise meet any additional criteria set by the Executive Committee.
AutoNDA by SimpleDocs
Property Preservation Population. The Property Preservation Population shall mean borrowers whose property was (i) subject to a property inspection by Nationstar or its agent, and (ii) was determined to be vacant, and (iii) as a result of that determination Nationstar or its agent changed the lock on the property between and including June 24, 2011 and December 29, 2017, and

Related to Property Preservation Population

  • LEAST RESTRICTIVE ENVIRONMENT/DUAL ENROLLMENT CONTRACTOR and XXX shall follow all LEA policies and procedures that support Least Restrictive Environment (“LRE”) options and/or dual enrollment options if available and appropriate, for students to have access to the general curriculum and to be educated with their nondisabled peers to the maximum extent appropriate. CONTRACTOR and XXX shall ensure that LRE placement options are addressed at all IEP team meetings regarding students for whom ISAs have been or may be executed. This shall include IEP team consideration of supplementary aids and services, goals and objectives necessary for placement in the LRE and necessary to enable students to transition to less restrictive settings. When an IEP team has determined that a student should be transitioned into the public school setting, CONTRACTOR shall assist the LEA in implementing the IEP team’s recommended activities to support the transition.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • Records Maintenance; Access Contractor shall maintain all financial records relating to this Contract in accordance with generally accepted accounting principles. In addition, Contractor shall maintain any other records, books, documents, papers, plans, records of shipments and payments and writings of Contractor, whether in paper, electronic or other form, that are pertinent to this Contract (“Records”) in such a manner as to clearly document Contractor's performance. Contractor acknowledges and agrees that Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to such financial records and other Records that are pertinent to this Contract, whether in paper, electronic or other form, to perform examinations and audits and make excerpts and transcripts. Contractor shall retain and keep accessible all such financial records and other Records for a minimum of 6 years, or such longer period as may be required by applicable law, following final payment and termination of this Contract, or until the conclusion of any audit, controversy or litigation arising out of or related to this Contract, whichever date is later.

  • Environmentally Preferable Procurement Policy The Environmentally Preferable Procurement Policy, along with a brief policy description, is located on the City’s website at the following link: xxxx://xxx.xxxxxxxxx.xxx/esd/natural-energy-resources/epp.htm. Environmental procurement policies and activities related to the completion of any Work will include, whenever practicable, but are not limited to:  The use of recycled and/or recyclable products in daily operations (i.e. 30%, 50%, 100% PCW paper, chlorine process free, triclosan free hand cleaner, etc.);  The use of energy-star compliant equipment;  The use of alternative fuel and hybrid vehicles, and implementation of protocols aimed at increasing the efficiency of vehicle operation;  The implementation of internal waste reduction and reuse protocol(s); and  Water and resource conservation activities within facilities, including bans on individual serving bottled water and the use of compostable food service products.

  • Interconnection Facilities Engineering Procurement and Construction Interconnection Facilities, Network Upgrades, and Distribution Upgrades shall be studied, designed, and constructed pursuant to Good Utility Practice. Such studies, design and construction shall be based on the assumed accuracy and completeness of all technical information received by the Participating TO and the CAISO from the Interconnection Customer associated with interconnecting the Large Generating Facility.

  • SUBSTANCE ABUSE POLICY See applicable administrative policy.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!