Recordkeeping Requirements COLLEGE and SCHOOL DISTRICT shall comply with the requirements governing maintenance of records of each request for access to and each disclosure of, student education records set forth under Title 34, Code of Federal Regulations § 99.32 and under Education Code § 49064 as applicable.
Record Keeping Requirements The Training Provider must make and keep accurate Records for all Training Services in sufficient detail to allow the Department to determine compliance with this Contract (including the accuracy of claims for payment of the Funds).
Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. B. Grantee shall use the Texas Abuse Hotline Website located at xxxxx://xxx.xxxxxxxxxxxxxx.xxx/Login/Default.aspx as required by the System Agency. Grantee shall retain reporting documentation on site and make it available for inspection by the System Agency.
Compliance with Record Keeping Requirements Participating Dealer agrees to comply with the record keeping requirements of the Exchange Act, including but not limited to, Rules 17a-3 and 17a-4 promulgated under the Exchange Act. Participating Dealer further agrees to keep such records with respect to each customer who purchases Primary Shares, his suitability and the amount of Primary Shares sold, and to retain such records for such period of time as may be required by the Commission, any state securities commission, FINRA or the Company.
Recordkeeping and Reporting The Subadvisor shall maintain the records and information required by Rule 31a-1 under the 1940 Act described in Schedule B attached hereto, with respect to the Assets of the Series. In addition, the Subadvisor shall maintain such other records relating to the services the Subadvisor provides under this Agreement as may be required in the future by applicable SEC and other applicable rules, and shall retain such information for such times and in such manner as required by applicable rules, including but not limited to Rule 31a-2 under the 1940 Act. The records maintained by the Subadvisor hereunder shall be the property of the Fund and shall be surrendered promptly upon request; subject, however, to the Subadvisor's right to retain all such records as the Subadvisor is required to maintain under the Advisers Act and the rules and regulations promulgated thereunder; provided, further, that the Fund shall be entitled to make and maintain copies of any records so retained by request.
Reporting and Recordkeeping The ownership of the property whether securities, cash and/or other property, and whether held by the Custodian or a subcustodian or in a depository, clearing agency or clearing system, shall be clearly recorded on the Custodian's books as belonging to the Series and not for the Custodian's own interest. Where certificates are legended or otherwise not fungible with publicly traded certificates (and in other cases where the Custodian and the Series may agree), the Series reserves the right to instruct the Custodian as to the name only in which such securities shall be registered and the Custodian, to the extent reasonably practicable, shall comply with such Instructions; provided, however, if the Custodian reasonably determines that compliance with such Instructions is not reasonably practicable or otherwise may conflict with applicable law, rule or regulation, the Custodian shall promptly notify the Series and shall comply with reasonable alternatives as to which the parties may agree. The Custodian shall keep accurate and detailed accounts of all investments, receipts, disbursements and other transactions for the Series. All accounts, books and records of the Custodian relating thereto shall be open to inspection and audit at all reasonable times during normal business hours of the Custodian by any person designated by the Series. All such books, records and accounts shall be maintained and preserved in the form reasonably requested by the Series and in accordance with the Act and the Rules and Regulations thereunder, including, without limitation, Section 31 thereof and Rule 31a-1 and 31a-2 thereunder. All books, records and accounts pertaining to the Series, which are in the possession of the Custodian, shall be the property of the Fund and such materials or (unless the delivery of original materials is required pursuant to applicable law) legible copies thereof in a format reasonably acceptable to the Fund, shall be surrendered promptly upon request; provided, however, that the Custodian shall be entitled to retain a copy or the original of any such books, records and accounts as may be required or permitted by applicable law and the Custodian's own policies and procedures. The Custodian will supply to the Series from time to time, as mutually agreed upon, a statement in respect to any property of the Series held by the Custodian or by a subcustodian.
Credentialing Requirements Registry Operator, through the facilitation of the CZDA Provider, will request each user to provide it with information sufficient to correctly identify and locate the user. Such user information will include, without limitation, company name, contact name, address, telephone number, facsimile number, email address and IP address.
Recordkeeping A. To maintain its accounting records in accordance with generally accepted accounting principles (“GAAP”). GAAP are established by the Financial Accounting Standards Board (“FASB”). B. To retain in the form in which it was created: 1. A record developed and maintained in accordance with 40 TAC §49.305, or its successor, until the latest of the following: a. seven years after the Contractor submits a claim for the service about which the record relates; b. seven years after all issues that arise from any litigation, claim, negotiation, audit, open records request, administrative review, or other action involving the record are resolved; or c. the person about whom the record relates becomes 21 years of age; and
Child Abuse Reporting Requirement Grantee will: a. comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. b. develop, implement and enforce a written policy that includes at a minimum the System Agency’s Child Abuse Screening, Documenting, and Reporting Policy for Grantees/Providers and train all staff on reporting requirements. c. use the System Agency Child Abuse Reporting Form located at xxxxx://xxx.xxxx.xxxxx.xx.xx/Contact Us/report abuse.asp as required by the System Agency. d. retain reporting documentation on site and make it available for inspection by the System Agency.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.