Security and Background Screening Sample Clauses

Security and Background Screening. Subcontractor and its Sub-subcontractors shall comply with the security and background screening requirements and criteria set forth in the Contract Documents and the Project Agreements.
AutoNDA by SimpleDocs

Related to Security and Background Screening

  • BACKGROUND This document contains final regulations regarding the proposed amendments to 26 CFR part 1 under section 860E of the Internal Revenue Code (Code). The regulations provide the circumstances under which a transferor of a noneconomic REMIC residual interest meeting the investigation and representation requirements may avail itself of the safe harbor by satisfying either the formula test or the asset test. Final regulations governing REMICs, issued in 1992, contain rules governing the transfer of noneconomic REMIC residual interests. In general, a transfer of a noneconomic residual interest is disregarded for all tax purposes if a significant purpose of the transfer is to enable the transferor to impede the assessment or collection of tax. A purpose to impede the assessment or collection of tax (a wrongful purpose) exists if the transferor, at the time of the transfer, either knew or should have known that the transferee would be unwilling or unable to pay taxes due on its share of the REMIC's taxable income. Under a safe harbor, the transferor of a REMIC noneconomic residual interest is presumed not to have a wrongful purpose if two requirements are satisfied: (1) the transferor conducts a reasonable investigation of the transferee's financial condition (the investigation requirement); and (2) the transferor secures a representation from the transferee to the effect that the transferee understands the tax obligations associated with holding a residual interest and intends to pay those taxes (the representation requirement).

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Intellectual Property and Information Technology (a) Section 5.20(a) of the Company Disclosure Schedule contains a true and complete list, as of the date of this Agreement, of all Company Products.

  • BACKGROUND OF AGREEMENT 1.1 LICENSOR represents that it has certain intellectual property pertaining to services and technologies in the field of teleradiology, in respect to which it is prepared to grant a nonexclusive license to LICENSEE.

  • Technical Information Methods, processes, formulae, compositions, systems, techniques, inventions, machines, computer programs and research projects, unpatented inventions, designs, know-how, trade secrets, technical information and data, specifications, blueprints, transparencies, test data, and additions, modifications, and improvements thereon which are revealed to Employee.

  • Technology and Intellectual Property (a) Schedule 2.22(a) sets forth a complete and correct list of all (i) registered trademarks, service marks, domain names, copyrights and patents; (ii) applications for registration or grant of any of the foregoing; (iii) unregistered trademarks, service marks, trade names, logos and assumed names; and (iv) licenses for any of the foregoing, in each case, owned by or for the benefit of the Company or a Company Subsidiary, or used in or necessary to conduct the Company’s or a Company Subsidiary’s business as presently conducted. The items on Schedule 2.22(a), together with all other trademarks, service marks, trade names, logos, assumed names, patents, copyrights, trade secrets, computer software, licenses, formulae, customer lists or other databases, business application designs and inventions currently used in or necessary to conduct the businesses of the Company or of a Company Subsidiary, constitute the “Intellectual Property.”

  • Know-How The term “

  • Background Intellectual Property The Recipient must own the Background Intellectual Property or hold sufficient Background Intellectual Property Rights to permit the Project to be carried out and the Project Intellectual Property to be exploited by the Recipient.

  • BACKGROUND STATEMENT The Borrower has requested that the Lenders make available to the Borrower a revolving credit facility in the aggregate principal amount of $100,000,000, subject to the availability provisions hereof. The Borrower will use the proceeds of these facilities as provided in Section 2.14. The Lenders are willing to make available to the Borrower the credit facilities described herein subject to and on the terms and conditions set forth in this Agreement.

  • Information Technology The Company’s and the Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) operate and perform in all material respects as required in connection with the operation of the business of the Company and the Subsidiaries as currently conducted. The Company, and the Subsidiaries maintain commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”) processed and stored thereon, and to the knowledge of the Company, there have been no breaches, incidents, violations, outages, compromises or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and the Subsidiaries are presently in compliance in all material respects with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for any such noncompliance that would not have a Material Adverse Effect.

Time is Money Join Law Insider Premium to draft better contracts faster.