Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Endorsements and Procedures You agree to restrictively endorse any item transmitted through our RDC service by either: • Signing the back of the item with your name and the words “For Mobile Deposit Only” • Following other instructions provided by us. You agree to follow any and all further procedures and instructions for use of our RDC service that we may communicate to you through changes to this agreement or through other notice we provide to you. You agree to securely retain each item for no fewer than 90 days after deposit. Then, no fewer than 90 days after deposit, you agree to mark each item submitted via our RDC service as “Void” and dispose of it using a high degree of care to ensure the item cannot be transmitted, deposited, or presented again. We reserve the right to impose daily limits on the aggregate amount of and/or number of deposits you may make using our RDC service. We may modify these limits at any time and without notice. Current limits are presented to you in our RDC service interface. Your enrollment in our RDC services generally occurs when you become an account owner; however, we reserve the right to deny your enrollment in and terminate your access to RDC service at our sole discretion. You warrant to us that: • You will only transmit eligible items that are properly endorsed. • You will not transmit duplicate items. • All information you provide to us when using our RDC service is accurate and true. • We will not sustain a loss because you have deposited an item. • You will indemnify us from any loss for breach of this warranty provision. In general, if an image of an item you transmit using RDC is received and accepted before 4:00 p.m. ET on a business day we are open, we consider that day to be the day of that deposit, subject to the other terms and conditions herein. Otherwise, we may consider the deposit to be made on the next Business Day we are open. Funds deposited using our RDC service will generally be made available by the third business day from the day of deposit. However, we generally make the first $225 of the aggregate of your checks deposited through our RDC service on each business day available by the next business day. We may delay the availability of your funds for a longer period of time at our discretion if we deem it appropriate in accordance with our policies and procedures.
COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.
Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.
Compliance with Other Agreements and Applicable Laws Borrower is not in default in any material respect under, or in violation in any material respect of any of the terms of, any agreement, contract, instrument, lease or other commitment to which it is a party or by which it or any of its assets are bound and Borrower is in compliance in all material respects with all applicable provisions of laws, rules, regulations, licenses, permits, approvals and orders of any foreign, Federal, State or local governmental authority.
Compliance with Laws and Material Contracts Each Borrower will comply, and cause each Subsidiary to comply, with the requirements of all applicable Laws and Material Contracts, except to the extent that failure to so comply could not reasonably be expected to (a) have a Material Adverse Effect, or (b) result in any Lien upon either (i) a material portion of the assets of any such Person in favor of any Governmental Authority, or (ii) any Collateral which is part of the Borrowing Base.
Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.
Compliance with Laws and Agreements; No Default Except where the failure to do so, individually or in the aggregate, could not reasonably be expected to result in a Material Adverse Effect, each Loan Party and each Subsidiary is in compliance with (i) all Requirements of Law applicable to it or its property and (ii) all indentures, agreements and other instruments binding upon it or its property. No Default has occurred and is continuing.
Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.
Authority; Compliance With Other Agreements and Instruments and Government Regulations The execution, delivery and performance by Borrower and the Subsidiary Guarantors of the Loan Documents to which it is a Party have been duly authorized by all necessary corporate action, and do not and will not: (a) Require any consent or approval not heretofore obtained of any partner, director, stockholder, security holder or creditor of such Party; (b) Violate or conflict with any provision of such Party's charter, articles of incorporation or bylaws, as applicable; (c) Result in or require the creation or imposition of any Lien (other than pursuant to the Loan Documents) or Right of Others upon or with respect to any Property now owned or leased or hereafter acquired by such Party; (d) Violate any Requirement of Law applicable to such Party; (e) Result in a breach of or constitute a default under, or cause or permit the acceleration of any obligation owed under, any material indenture or loan or credit agreement or any other Contractual Obligation to which such Party is a party or by which such Party or any of its Property is bound or affected; and such Party is not in violation of, or default under, any Requirement of Law or Contractual Obligation, or any material indenture, loan or credit agreement described in Section 4.2(e), in any respect that constitutes a Material Adverse Effect.