Safeguards and Social Information Sample Clauses

Safeguards and Social Information. (i) All information generated by the Borrower and submitted to any Governmental Authority, the Senior Lenders and/or to affected persons or other stakeholders in connection with any labour, environmental, health and safety, involuntary resettlement or indigenous peoples matter in connection with the Project was true, complete and accurate in all material respects at the time of submission and no such document omitted any information the omission of which would have made such document misleading in any material respect. (ii) All information not generated by the Borrower submitted to any Governmental Authority in connection with social and environmental matters relating to the Project was, to the best of its knowledge (after making such investigations as a prudent developer would undertake in the normal course of business), true, complete and accurate in all material respects at the time of submission. (iii) All opinions, projections and forecasts generated by the Borrower and submitted to any Governmental Authority, and, to the best of its knowledge (after making such investigations as a prudent developer would undertake in the normal course of business), all opinions, projections and forecasts not generated by the Borrower but submitted to any Governmental Authority in connection with social and environmental matters relating to the Project have been diligently arrived at and provided in good faith at the time of submission, and there is no omission which makes such submitted documents misleading in any material respect.
AutoNDA by SimpleDocs

Related to Safeguards and Social Information

  • Environmental and Social Safeguards All of the Projects will be implemented in compliance with the MCC Environmental Guidelines and the MCC Gender Policy, and any resettlement will be carried out in accordance with the World Bank’s Operational Policy on Involuntary Resettlement in effect as of July 2007 (“OP 4.12”) in a manner acceptable to MCC. In accordance with its policies, the Government will ensure that the Projects comply with all national environmental laws and regulations, licenses and permits, except to the extent such compliance would be inconsistent with this Compact. Specifically, the Government will: (a) cooperate with or complete, as the case may be, any ongoing environmental assessments, or if necessary undertake and complete any additional environmental assessments, social assessments, environmental management plans, environmental and social audits, resettlement policy frameworks, and resettlement action plans required under the laws of Indonesia, the MCC Environmental Guidelines, this Compact, the PIA, or any Supplemental Agreement, or as otherwise required by MCC, each in form and substance satisfactory to MCC; (b) ensure that Project-specific environmental and social management plans are developed and all relevant measures contained in such plans are integrated into project design, the applicable procurement documents and associated finalized contracts, in each case, in form and substance satisfactory to MCC; and (c) implement to MCC’s satisfaction appropriate environmental and social mitigation measures identified in such assessments or plans. Unless MCC agrees otherwise in writing, the Government will fund all necessary costs of environmental and social mitigation measures (including, without limitation, costs of resettlement) not specifically provided for, or that exceed the MCC Funding specifically allocated for such costs in, the Detailed Financial Plan for any Project. To maximize the positive social impacts of the Projects, address cross-cutting social and gender issues such as human trafficking, child and forced labor, and HIV/AIDS, and to ensure compliance with the MCC Gender Policy, the Government will: (x) develop a comprehensive social and gender integration plan which, at a minimum, identifies approaches for regular, meaningful and inclusive consultations with women and other vulnerable/underrepresented groups, consolidates the findings and recommendations of Project-specific social and gender analyses and sets forth strategies for incorporating findings of the social and gender analyses into final Project designs as appropriate (“Social and Gender Integration Plan”); and (y) ensure, through monitoring and coordination during implementation, that final Activity designs, construction tender documents and implementation plans are consistent with and incorporate the outcomes of the social and gender analyses and social and gender integration plan. To address gender concerns that impact women’s ability to participate across Projects, MCA- Indonesia will adopt a detailed workplan, subject to MCC approval, for gender work to be undertaken at the policy, institutional capacity building and community levels (the “Targeted Gender Activities”). Xxxxx XX sets forth the MCC Funding allocated for the performance of the Targeted Gender Activities. Prior to the second disbursement of MCC Funding for the Targeted Gender Activities, MCA-Indonesia shall have completed detailed action plans and provided evidence of demonstrated commitment of relevant stakeholders to addressing policy constraints identified in the workplan.

  • Safeguards for Personal Information Supplier agrees to develop, implement, maintain, and use administrative, technical, and physical safeguards, as deemed appropriate by DXC, to preserve the security, integrity and confidentiality of, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, and to protect against unauthorized access to or accidental or unlawful destruction, loss, or alteration of, the Personal Information Processed, created for or received from or on behalf of DXC in connection with the Services, functions or transactions to be provided under or contemplated by this Agreement. Such safeguards shall meet all applicable legal standards (including any encryption requirements imposed by law) and shall meet or exceed accepted security standards in the industry, such as ISO 27001/27002. Supplier agrees to document and keep these safeguards current and shall make the documentation available to DXC upon request. Supplier shall ensure that only Supplier’s employees or representatives who may be required to assist Supplier in meeting its obligations under this Agreement shall have access to the Personal Information.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Other Confidential Consumer Information Party agrees to comply with the requirements of AHS Rule No. 08-048 concerning access to and uses of personal information relating to any beneficiary or recipient of goods, services or other forms of support. Party further agrees to comply with any applicable Vermont State Statute and other regulations respecting the right to individual privacy. Party shall ensure that all of its employees, subcontractors and other service providers performing services under this agreement understand and preserve the sensitive, confidential and non-public nature of information to which they may have access.

  • Contractor Information The Contractor will provide up to date information for each of the following in the form and manner specified by OGS:

  • Treatment of Confidential Information (A) Each party agrees that at all times during and after the terms of this Agreement, it shall use, handle, collect, maintain, and safeguard Confidential Information in accordance with (1) the confidentiality and non-disclosure requirements of this Agreement; (2) the GLB Act, as applicable and as it may be amended; and (3) such other Applicable Law, whether in effect now or in the future. (B) Without limiting the foregoing, the Receiving Party shall apply to any Confidential Information at least the same degree of reasonable care used for its own confidential and proprietary information to avoid unauthorized disclosure or use of Confidential Information under this Agreement. (C) Each party further agrees that: (1) The Receiving Party will hold all Confidential Information it obtains in strictest confidence and will use and permit use of Confidential Information solely for the purposes of this Agreement or as otherwise provided for in this Agreement, and consistent therewith, may disclose or provide access to its responsible employees or agents who have a need to know and are under adequate confidentiality agreements or arrangements and make copies of Confidential Information to the extent reasonably necessary to carry out its obligations under this Agreement; (2) Notwithstanding the foregoing, the Receiving Party may release Confidential Information as permitted or required by law or approved in writing by the Disclosing party, which approval shall not be unreasonably withheld and may not be withheld where the Receiving Party may be exposed to civil or criminal liability or proceedings for failure to release such information; (3) Additionally, Ultimus may provide Confidential Information typically supplied in the investment company industry to companies that track or report price, performance or other information regarding investment companies; and (4) The Receiving Party will immediately notify the Disclosing Party of any unauthorized disclosure or use, and will cooperate with the Disclosing Party to protect all proprietary rights in any Confidential Information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!