Reporting Policy Violation Sample Clauses

Reporting Policy Violation. A. A Wellness Advisor who observes a policy violation by another is encouraged to submit an e-mail chronicling said violation directly to the Company Compliance Department at “xxxxxxxxxx@xxxxxxxxxxxxx.xxx”. The letter shall set forth the details of the incident in the following manner: I. A description of the nature of the violation and specific facts to support the allegations; II. Dates and the number of occurrences; III. The persons involved; and IV. Any other supporting documentation. B. Once the matter has been brought to the Company’s attention, it will be researched thoroughly. If needed, the Compliance Department will take appropriate action. C. This section refers to the general reporting of policy violations as observed by other Wellness Advisors in order to support, protect, and defend the integrity of the Magneceutical Health business and opportunity. If a Wellness Advisor has a grievance or complaint against another Advisor which directly relates to his or her Magneceutical Health business, the Advisor should follow the procedures set forth in these Policies.
AutoNDA by SimpleDocs
Reporting Policy Violation. A. An IC who observes a policy violation by another IC should submit a written and signed letter (email will not be accepted) of the violation directly to the Company Corporate office. The letter shall set forth the details of the incident as follows: I. The nature of the violation and specific facts to support the allegations; II. Dates and number of occurrences; III. The person/people involved; and IV. Supporting documentation. B. Once the matter has been presented to Company, the Company Compliance Department will investigate the report thoroughly and decide what, if any, action should be taken. C. This Section refers to the general reporting of policy violations as observed by other ICs for the mutual effort to support, protect, and defend the integrity of the TRS business and sales opportunity. If an IC has a grievance or complaint against another IC which directly relates to their TRS business, the steps set forth in these Policies and Procedures must be followed.
Reporting Policy Violation. A. A Distributor who observes a policy violation by another Distributor should submit an email to the Compliance Department at xxxxxxxxxx@xxxxxxxxx.xxx. The letter shall set forth the details of the incident as follows: I. The nature of the violation; II. Specific facts to support the allegations; III. Dates; IV. Number of occurrences; V. Persons involved; and VI. Supporting documentation

Related to Reporting Policy Violation

  • Reporting Violations You must immediately report any known violation of the District’s applicable policies, Internet safety plan, or acceptable use guidelines to a supervising teacher (if student) or the technology coordinator. • You must report to a supervising teacher (if student) or the technology coordinator any requests for personally identifying information or contact from unknown individuals, as well as any content or communication that is abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal. User’s Name (printed):

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Disclosure Controls and Procedures; Deficiencies in or Changes to Internal Control Over Financial Reporting The Company has established and maintains disclosure controls and procedures (as defined in Rules 13a-15 and 15d-15 under the Exchange Act), which (i) are designed to ensure that material information relating to the Company, including its consolidated subsidiaries, is made known to the Company’s principal executive officer and its principal financial officer by others within those entities, particularly during the periods in which the periodic reports required under the Exchange Act are being prepared; (ii) have been evaluated by management of the Company for effectiveness as of the end of the Company’s most recent fiscal quarter; and (iii) are effective in all material respects to perform the functions for which they were established. Since the end of the Company’s most recent audited fiscal year, there have been no significant deficiencies or material weakness in the Company’s internal control over financial reporting (whether or not remediated) and no change in the Company’s internal control over financial reporting that has materially affected, or is reasonably likely to materially affect, the Company’s internal control over financial reporting. The Company is not aware of any change in its internal control over financial reporting that has occurred during its most recent fiscal quarter that has materially affected, or is reasonably likely to materially affect, the Company’s internal control over financial reporting.

  • General Reporting Requirements The MA-PD Sponsor agrees to submit to information to CMS according to 42 CFR §§423.505(f), 423.514, and the “Final Medicare Part D Reporting Requirements,” a document issued by CMS and subject to modification each program year.

  • Adverse Event Reporting Both Parties acknowledge the obligation to comply with the Protocol and / or applicable regulations governing the collection and reporting of adverse events of which they may become aware during the course of the Clinical Trial. Both Parties agree to fulfil and ensure that their Agents fulfil regulatory requirements with respect to the reporting of adverse events.

  • Reporting Requirement (1) In the event the Contractor identifies covered telecommunications equipment or services used as a substantial or essential component of any system, or as critical technology as part of any system, during contract performance, or the Contractor is notified of such by a subcontractor at any tier or by any other source, the Contractor shall report the information in paragraph (d)(2) of this clause to the Contracting Officer, unless elsewhere in this contract are established procedures for reporting the information; in the case of the Department of Defense, the Contractor shall report to the website at xxxxx://xxxxxx.xxx.xxx. For indefinite delivery contracts, the Contractor shall report to the Contracting Officer for the indefinite delivery contract and the Contracting Officer(s) for any affected order or, in the case of the Department of Defense, identify both the indefinite delivery contract and any affected orders in the report provided at xxxxx://xxxxxx.xxx.xxx. (2) The Contractor shall report the following information pursuant to paragraph (d)(1) of this clause (i) Within one business day from the date of such identification or notification: the contract number; the order number(s), if applicable; supplier name; supplier unique entity identifier (if known); supplier Commercial and Government Entity (CAGE) code (if known); brand; model number (original equipment manufacturer number, manufacturer part number, or wholesaler number); item description; and any readily available information about mitigation actions undertaken or recommended. (ii) Within 10 business days of submitting the information in paragraph (d)(2)(i) of this clause: any further available information about mitigation actions undertaken or recommended. In addition, the Contractor shall describe the efforts it undertook to prevent use or submission of covered telecommunications equipment or services, and any additional efforts that will be incorporated to prevent future use or submission of covered telecommunications equipment or services.

  • Child Abuse Reporting Requirement Grantee will: a. comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. b. develop, implement and enforce a written policy that includes at a minimum the System Agency’s Child Abuse Screening, Documenting, and Reporting Policy for Grantees/Providers and train all staff on reporting requirements. c. use the System Agency Child Abuse Reporting Form located at xxxxx://xxx.xxxx.xxxxx.xx.xx/Contact Us/report abuse.asp as required by the System Agency. d. retain reporting documentation on site and make it available for inspection by the System Agency.

  • Reporting Compliance The Company is subject to, and is in compliance in all material respects with, the reporting requirements of Section 13 and Section 15(d), as applicable, of the Exchange Act.

  • Financial Reporting Requirements The Charter School shall follow the financial requirements of the Charter Schools Section of the Department’s Financial Management for Georgia Local Units of Administration Manual. The Charter School shall submit all information required by the State Accounting Office for inclusion in the State of Georgia Comprehensive Annual Financial Report.

  • Non-Violation The execution and delivery of this Amendment and the performance and observance by it of the terms and provisions hereof (a) do not violate or contravene its Organization Documents or any applicable Laws or (b) conflict with or result in a breach or contravention of any provision of, or constitute a default under, any other agreement, instrument or document binding upon or enforceable against it.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!