Servicer’s Customary Practices and Procedures Sample Clauses

Servicer’s Customary Practices and Procedures. The parties hereto acknowledge that as of the date hereof, the Servicer is in the process of implementing new customary practices and procedures, which shall be approved by the Administrative Agent at the direction of the Required Lenders in their reasonable discretion and shall be completed within sixty (60) days of the date hereof. Prior to such implementation, the Servicer shall comply with the Servicing Standard and after such implementation, the Servicer shall comply with the Servicer’s customary practices and procedures and the Servicing Standard. Servicer shall not materially revise Servicer’s customary practices and procedures without the prior written consent of the Borrower, and so long as the Loan Agreement is in effect, the Administrative Agent.
AutoNDA by SimpleDocs

Related to Servicer’s Customary Practices and Procedures

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Operational Procedures In order to minimize operational problems, it will be necessary for trade information to be supplied in a secure manner by the Subadviser to the Fund’s Service Providers, including: JPMorgan Chase Bank, National Association (the “Custodian”), Virtus Fund Services (the “Fund Administrator”) BNY Mellon Investment Servicing (US) Inc., (the “Sub-Accounting Agent”), any Prime Broker to the Series, and all other Counterparties/Brokers as required. The Subadviser must furnish the Fund’s service providers with required daily information as to executed trades in a format and time-frame agreed to by the Subadviser, Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties and designated persons of the Fund. Trade information sent to the Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties must include all necessary data within the required timeframes to allow such parties to perform their obligations to the Series. The Sub-Accounting Agent specifically requires a daily trade blotter with a summary of all trades, in addition to trade feeds, including, if no trades are executed, a report to that effect. Daily information as to executed trades for same-day settlement and future trades must be sent to the Sub-Accounting Agent no later than 4:30 p.m. (Eastern Time) on the day of the trade each day the Fund is open for business. All other executed trades must be delivered to the Sub-Accounting Agent on Trade Date plus 1 by Noon (Eastern Time) to ensure that they are part of the Series’ NAV calculation. (The Subadviser will be responsible for reimbursement to the Fund for any loss caused by the Subadviser’s failure to comply with the requirements of this Schedule A.) On fiscal quarter ends and calendar quarter ends, all trades must be delivered to the Sub-Accounting Agent by 4:30 p.m. (Eastern Time) for inclusion in the financial statements of the Series. The data to be sent to the Sub-Accounting Agent and/or Fund Administrator will be as agreed by the Subadviser, Fund Administrator, Sub-Accounting Agent and designated persons of the Fund and shall include (without limitation) the following:

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Standard Operating Procedures Standard Operating Procedures shall not contravene the Canada Labour Code, the Canadian Human Rights Code, or the Collective Agreement, and an allegation of such contravention is subject to the grievance procedure.

  • SAFETY PRACTICES (a) i Employees requiring glasses must wear glasses, preferably with safety lenses instead of contact lenses while on the job site. ii W.C.B. approved safety footwear must be worn at all times while on the job site. iii Employee attire will be in conformance with W.C.B. Regulation and the Employer’s policy.

  • Quality Control Procedures The Seller shall have an internal quality control program that verifies, on a regular basis, the existence and accuracy of the legal documents, credit documents, property appraisals, and underwriting decisions. The program shall include evaluating and monitoring the overall quality of the Seller's loan production and the servicing activities of the Seller. The program is to ensure that the Mortgage Loans are originated and serviced in accordance with Accepted Servicing Standards and the Underwriting Guidelines; guard against dishonest, fraudulent, or negligent acts; and guard against errors and omissions by officers, employees, or other authorized persons.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • RECOVERY PROCEDURES The nature and severity of any disaster will influence the recovery procedures. One crucial factor in determining how BellSouth will proceed with restoration is whether or not BellSouth's equipment is incapacitated. Regardless of who's equipment is out of service, BellSouth will move as quickly as possible to aid with service recovery; however, the approach that will be taken may differ depending upon the location of the problem.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!