Filing of Amendments; Response to Commission Requests The Company will promptly advise the Representatives of any proposal to amend or supplement at any time the Initial Registration Statement, any Additional Registration Statement or any Statutory Prospectus and will not effect such amendment or supplementation without the Representatives’ consent; and the Company will also advise the Representatives promptly of (i) the effectiveness of any Additional Registration Statement (if its Effective Time is subsequent to the execution and delivery of this Agreement), (ii) any amendment or supplementation of a Registration Statement or any Statutory Prospectus, (iii) any request by the Commission or its staff for any amendment to any Registration Statement, for any supplement to any Statutory Prospectus or for any additional information, (iv) the institution by the Commission of any stop order proceedings in respect of a Registration Statement or the threatening of any proceeding for that purpose, and (v) the receipt by the Company of any notification with respect to the suspension of the qualification of the Offered Securities in any jurisdiction or the institution or threatening of any proceedings for such purpose. The Company will use its best efforts to prevent the issuance of any such stop order or the suspension of any such qualification and, if issued, to obtain as soon as possible the withdrawal thereof.
Response to Notice Within ten business days of receiving the Claim Notice, the Respondent must notify the Claimant of its representative to negotiate the dispute.
Response to Objections Each Party retains the right to respond to any objection raised by a Participating Class Member, including the right to file responsive documents in Court no later than five court days prior to the Final Approval Hearing, or as otherwise ordered or accepted by the Court.
Response to Demand Letter Within 10 days after the receipt of the Demand Letter, RMC shall either: (a) cure the breach to OIG’s satisfaction and pay the applicable Stipulated Penalties or (b) request a hearing before an HHS administrative law judge (ALJ) to dispute OIG’s determination of noncompliance, pursuant to the agreed upon provisions set forth below in Section X.E. In the event RMC elects to request an ALJ hearing, the Stipulated Penalties shall continue to accrue until RMC cures, to OIG’s satisfaction, the alleged breach in dispute. Failure to respond to the Demand Letter in one of these two manners within the allowed time period shall be considered a material breach of this CIA and shall be grounds for exclusion under Section X.D.
Response Times Qubit bases its response times and the actions it takes to resolve problems on an assessment of the impact of the reported technical issue. The more serious the impact, the higher the assigned priority. For all support issues relating to Customer, Qubit will respond in accordance with Table 1: P1 1 hour 4 hours P2 1 hour 8 hours P3 4 hours 72 hours P4 1 business day Next or a later major release **The Priority Levels are defined in Section II(2) below.
Response/Compliance with Audit or Inspection Findings A. Grantee must act to ensure its and its Subcontractors’ compliance with all corrections necessary to address any finding of noncompliance with any law, regulation, audit requirement, or generally accepted accounting principle, or any other deficiency identified in any audit, review, inspection or investigation of the Grant Agreement and the services and Deliverables provided. Any such correction will be at Grantee’s or its Subcontractor's sole expense. Whether Xxxxxxx's action corrects the noncompliance shall be solely the decision of the System Agency. B. As part of the services, Grantee must provide to HHS upon request a copy of those portions of Grantee's and its Subcontractors' internal audit reports relating to the services and Deliverables provided to the State under the Grant Agreement. C. Grantee shall include the requirement to provide to System Agency (and any of its duly authorized federal, state, or local authorities) internal audit reports related to this Grant Agreement in any Subcontract it awards. Upon request by System Agency, Grantee shall enforce this requirement against its Subcontractor. Further, Grantee shall include in any Subcontract it awards a requirement that all Subcontractor Subcontracts must also include these provisions.
Condition to Company Action The Company will not take any action that consummates or finalizes a Change in Control unless (i) at least 15 Business Days prior to such action it shall have given to each holder of Notes written notice containing and constituting an offer to prepay Notes as described in subparagraph (c) of this Section 8.7, accompanied by the certificate described in subparagraph (g) of this Section 8.7, and (ii) contemporaneously with such action, it prepays all Notes required to be prepaid in accordance with this Section 8.7.
Deadlines for Providing Insurance Documents after Renewal or Upon Request As set forth herein, certain insurance documents must be provided to the OGS Procurement Services contact identified in the Contract Award Notice after renewal or upon request. This requirement means that the Contractor shall provide the applicable insurance document to OGS as soon as possible but in no event later than the following time periods:
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Response Time PROVIDING PARTY shall respond to and resolve any problems in connection with the Corporate Services for RECEIVING PARTY within a commercially reasonable period of time, using response and proposed resolution times consistent with its response and resolution of such problems for itself.