Asset Management a. Data Sensitivity - Transfer Agent acknowledges that it understands the sensitivity of Fund Data.
S.T If Federal Funds are not received on time, such funds will be invested, and shares purchased thereby will be issued, as soon as practicable.
Western will as requested by the Manager oversee the maintenance of all books and records with respect to the investment transactions of the Fund in accordance with all applicable federal and state laws and regulations, and will furnish the Directors with such periodic and special reports as the Directors or the Manager reasonably may request.
AT&T 13STATE shall provide and maintain such equipment at the 911 SR and the DBMS as is necessary to perform the 911/E911 services set forth herein when AT&T-13STATE is the 911/E911 Service Provider for a Rate Center in which CARRIER is authorized to provide local telephone exchange service and has LWC End Users. This shall include the following:
Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.
Name of Building Tenant shall not use the name of the Building for any purpose other than as the address of the business conducted by Tenant in the Premises without the written consent of Landlord. Landlord reserves the right to change the name of the Building at any time in its sole discretion by written notice to Tenant and Landlord shall not be liable to Tenant for any loss, cost or expense on account of any such change of name.
LTD By: __________________________ Name: Title: SIGNATURE PAGE TO UNDERTAKING AGREEMENT XXXXXX XXXXXX By: __________________________ Name: Title: SIGNATURE PAGE TO UNDERTAKING AGREEMENT EXHIBIT A IRREVOCABLE PROXY The undersigned shareholder of ECI Telecom Ltd., a company formed under the laws of the State of Israel (the "COMPANY") hereby irrevocably appoints and constitutes Xxxxx Xxxxx and/or Zohar Uzdin as the attorney and proxy of the undersigned with full power of substitution and resubstitution to the full extent of the undersigned's rights with respect to (i) the issued and outstanding ordinary shares, par value NIS 0.12 per share of the Company ("COMPANY SHARES"), owned of record by the undersigned as of the date of this proxy, which shares are specified on the final page of this proxy and (ii) any and all other Company Shares which the undersigned may acquire of record after the date hereof (collectively, the "SUBJECT SECURITIES"). Upon execution of this proxy, all prior proxies given by the undersigned with respect to any of the Subject Securities regarding the matters that are the subject hereof, are hereby revoked and no subsequent proxies will be given with respect to any of the Subject Securities. This proxy is irrevocable and coupled with an interest, until the earliest to occur of any of the events specified in clauses (i) through (iii) of the following paragraph, at which time this proxy shall automatically be revoked. Each of the attorneys and proxies named above are hereby instructed and authorized to exercise this proxy to appear in the name and instead of the undersigned for the purpose of establishing a quorum and to vote (or cause to be voted) all of the Subject Securities, at any general, special or other meeting of the shareholders of the Company, and at any adjournment(s) or postponement(s) thereof, however called or convened, or pursuant to any consent in lieu of a meeting or otherwise, which the undersigned has the right to so vote during the period from the date hereof until the earlier of (i) immediately prior to the termination of the Agreement and Plan of Merger (the "MERGER AGREEMENT"), dated the date hereof, among the Company, Epsilon 1 Ltd. , an Israeli company ("PURCHASER") and Epsilon 3 Ltd., an Israeli company and an indirect wholly owned subsidiary of Purchaser ("MERGER SUB"), in accordance with its terms, (ii) the agreement of Purchaser and the undersigned to terminate this proxy, and (iii) the Effective Time (as defined in the Merger Agreement):
Health Care The Company will reimburse the Executive for the cost of maintaining continuing health coverage under COBRA for a period of no more than 12 months following the date of termination, less the amount the Executive is expected to pay as a regular employee premium for such coverage. Such reimbursements will cease if the Executive becomes eligible for similar coverage under another benefit plan.
Alex Xxxxx shall furnish, at its expense and without cost to the Fund, the services of personnel to the extent that such services are required to carry out their obligations under this Agreement;
Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.