Regulators’ Separateness Requirements Applicable to Transactions Sample Clauses

Regulators’ Separateness Requirements Applicable to Transactions. The Company will comply with the ring fencing requirements set forth in the Merger Commitments.
AutoNDA by SimpleDocs

Related to Regulators’ Separateness Requirements Applicable to Transactions

  • Compliance with Applicable Laws; Distribution of Prospectus and Reports; Confirmations In connection with its respective activities hereunder, each party agrees to abide by the Conduct Rules of FINRA and all other rules of self-regulatory organizations of which the relevant party is a member, as well as all laws, rules and regulations, including federal and state securities laws, that are applicable to the relevant party (and its associated persons) from time to time in connection with its activities hereunder (“Applicable Laws”). You are authorized to distribute to your customers the current Prospectus, as well as any supplemental sales material received from the Fund or the Distributor (acting on behalf of the Fund) (on the terms and for the period specified by us or stated in such material). You are not authorized to distribute, furnish or display any other sales or promotional material relating to a Fund without our prior written approval, but you may identify the Funds in a listing of mutual funds available through you to your customers. Unless otherwise mutually agreed in writing, you shall deliver or cause to be delivered to each customer who purchases shares of any Funds from or through you, copies of all annual and interim reports, proxy solicitation materials, and any other information and materials relating to such Funds and prepared by or on behalf of the Funds or us. If required by Rule 10b-10 under the Securities Exchange Act or other Applicable Laws, you shall send or cause to be sent confirmations or other reports to your customers containing such information as may be required by Applicable Laws.

  • Conditions Applicable to All Sale and Purchase Transactions (a) Any transaction effected under this Article X or in connection with the acquisition of additional Collateral Loans shall be conducted on an arm’s length basis and, if effected with a Person that is an Affiliate of the Collateral Manager (or with an account or portfolio for which the Collateral Manager or any of its Affiliates serves as investment adviser), shall be on terms no less favorable to the Borrower than would be the case if such Person were not such an Affiliate or as otherwise expressly permitted in this Agreement. (b) Upon each contribution of one or more Collateral Loans from the BDC to the Borrower and upon each acquisition by the Borrower of a Collateral Loan from the BDC, the Collateral Manager or any of their respective Affiliates (each such contribution or other such acquisition, an “Affiliate Loan Acquisition”) (i) all of the Borrower’s right, title and interest to such Collateral Loan shall be subject to the Lien granted to the Collateral Agent pursuant to this Agreement and (ii) such Collateral Loan shall be Delivered to the Collateral Agent (or the Custodian on its behalf, as applicable), provided, that, notwithstanding the foregoing, the Related Documents and Loan Checklist may be delivered within ten (10) Business Days of the contribution or acquisition. (c) The Aggregate Principal Balance of the Collateral Loan(s) which are the subject of any sale to an Affiliate of the Borrower under this Article X or substitution pursuant to Section 10.03, together with the sum of the Aggregate Principal Balance of all Collateral Loans sold to Affiliates or substituted in the 12 month period preceding the proposed date of sale or substitution (or such lesser number of months as shall have elapsed since the Closing Date) shall not exceed 20% of the Net Purchased Loan Balance; provided that, the sum of the Aggregate Principal Balance of all Defaulted Collateral Loans or Ineligible Collateral Loans sold to Affiliates or substituted in the 12 month period preceding the proposed date of sale or substitution (or such lesser number of months as shall have elapsed since the Closing Date) shall not exceed 10% of the Net Purchased Loan Balance. For the avoidance of doubt, the foregoing limitations shall not apply (i) to Warranty Loans (as defined in the Purchase and Sale Agreement) or (ii) where Collateral Loans are sold by the Borrower in connection with a Permitted Securitization.

  • Requirements Pertaining Only to Federal Grants and Subrecipient Agreements If this Agreement is a grant that is funded in whole or in part by Federal funds:

  • CONFLICTS WITH TRUST’S GOVERNING DOCUMENTS AND APPLICABLE LAWS Nothing herein contained shall be deemed to require the Trust or any Fund to take any action contrary to the Trust’s Agreement and Declaration of Trust, Amended and Restated By-Laws, or any applicable statute or regulation, or to relieve or deprive the Board of Trustees of its responsibility for and control of the conduct of the affairs of the Trust and Fund. In this connection, the Adviser acknowledges that the Trustees retain ultimate plenary authority over each Fund and may take any and all actions necessary and reasonable to protect the interests of shareholders.

  • Minimum Site Requirements for TIPS Sales (when applicable to TIPS Sale). Cleanup: When performing work on site at a TIPS Member’s property, Vendor shall clean up and remove all debris and rubbish resulting from their work as required or directed by the TIPS Member or as agreed by the parties. Upon completion of work, the premises shall be left in good repair and an orderly, neat, clean and unobstructed condition. Preparation: Vendor shall not begin a project for which a TIPS Member has not prepared the site, unless Vendor does the preparation work at no cost, or until TIPS Member includes the cost of site preparation in the TIPS Sale Site preparation includes, but is not limited to: moving furniture, installing wiring for networks or power, and similar pre‐installation requirements. Registered Sex Offender Restrictions: For work to be performed at schools, Vendor agrees that no employee of Vendor or a subcontractor who has been adjudicated to be a registered sex offender will perform work at any time when students are, or reasonably expected to be, present unless otherwise agreed by the TIPS Member. Vendor agrees that a violation of this condition shall be considered a material breach and may result in the cancellation of the TIPS Sale at the TIPS Member’s discretion. Vendor must identify any additional costs associated with compliance of this term. If no costs are specified, compliance with this term will be provided at no additional charge. Safety Measures: Vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage. Smoking: Persons working under Agreement shall adhere to the TIPS Member’s or local smoking statutes, codes, ordinances, and policies.

  • ACCOUNTS SUBJECT TO ERISA The ERISA Rider is applicable to all Customers Under Section II of this Schedule A.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Compliance with Xxxxx-Xxxxx and Related Act requirements All rulings and interpretations of the Xxxxx-Xxxxx and Related Acts contained in 29 CFR parts 1, 3, and 5 are herein incorporated by reference in this contract.

  • Amendments and Supplements to Permitted Section 5(d) Communications If at any time following the distribution of any Permitted Section 5(d) Communication, there occurred or occurs an event or development as a result of which such Permitted Section 5(d) Communication included or would include an untrue statement of a material fact or omitted or would omit to state a material fact necessary in order to make the statements therein, in the light of the circumstances existing at that subsequent time, not misleading, the Company will promptly notify the Representatives and will promptly amend or supplement, at its own expense, such Permitted Section 5(d) Communication to eliminate or correct such untrue statement or omission.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!