Activities of ALPS The services of ALPS under this Agreement are not to be deemed exclusive, and ALPS shall be free to render similar services to others. The Fund recognizes that from time to time directors, officers and employees of ALPS may serve as directors, officers and employees of other corporations or businesses (including other investment companies) and that such other corporations and businesses may include ALPS as part of their name and that ALPS or its affiliates may enter into distribution agreements or other agreements with such other corporations and businesses.
FORMAT AND CONTENT FOR REGISTRY OPERATOR MONTHLY REPORTING Registry Operator shall provide one set of monthly reports per gTLD, using the API described in draft-‐xxxxxx-‐icann-‐registry-‐interfaces, see Specification 2, Part A, Section 9, reference 5, with the following content. ICANN may request in the future that the reports be delivered by other means and using other formats. ICANN will use reasonable commercial efforts to preserve the confidentiality of the information reported until three (3) months after the end of the month to which the reports relate. Unless set forth in this Specification 3, any reference to a specific time refers to Coordinated Universal Time (UTC). Monthly reports shall consist of data that reflects the state of the registry at the end of the month (UTC).
Activities of JCM The services of JCM to the Trust hereunder are not to be deemed to be exclusive, and JCM and its affiliates are free to render services to other parties. It is understood that trustees, officers and shareholders of the Trust are or may become interested in JCM as directors, officers and shareholders of JCM, that directors, officers, employees and shareholders of JCM are or may become similarly interested in the Trust, and that JCM may become interested in the Trust as a shareholder or otherwise.
Audit and Inspection of Plants, Places of Business and Records (a) The State and its agents, including, but not limited to, the Connecticut Auditors of Public Accounts, Attorney General and State’s Attorney and their respective agents, may, at reasonable hours, inspect and examine all of the parts of the Contractor’s and Contractor Parties’ plants and places of business which, in any way, are related to, or involved in, the performance of this Contract. (b) The Contractor shall maintain, and shall require each of the Contractor Parties to maintain, accurate and complete Records. The Contractor shall make all of its and the Contractor Parties’ Records available at all reasonable hours for audit and inspection by the State and its agents. (c) The State shall make all requests for any audit or inspection in writing and shall provide the Contractor with at least twenty-four (24) hours’ notice prior to the requested audit and inspection date. If the State suspects fraud or other abuse, or in the event of an emergency, the State is not obligated to provide any prior notice. (d) The Contractor will pay for all costs and expenses of any audit or inspection which reveals information that, in the sole determination of the State, is sufficient to constitute a breach by the Contractor under this Contract. The Contractor will remit full payment to the State for such audit or inspection no later than 30 days after receiving an invoice from the State. If the State does not receive payment within such time, the State may setoff the amount from any moneys which the State would otherwise be obligated to pay the Contractor in accordance with this Contract's Setoff provision. (e) The Contractor shall keep and preserve or cause to be kept and preserved all of its and Contractor Parties’ Records until three (3) years after the latter of (i) final payment under this Contract, or (ii) the expiration or earlier termination of this Contract, as the same may be modified for any reason. The State may request an audit or inspection at any time during this period. If any Claim or audit is started before the expiration of this period, the Contractor shall retain or cause to be retained all Records until all Claims or audit findings have been resolved. (f) The Contractor shall cooperate fully with the State and its agents in connection with an audit or inspection. Following any audit or inspection, the State may conduct and the Contractor shall cooperate with an exit conference. (g) The Contractor shall incorporate this entire Section verbatim into any contract or other agreement that it enters into with any Contractor Party.
Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.
Obligations and Activities of Business Associates (1) Business Associate agrees not to use or disclose PHI other than as permitted or required by this Section of the Contract or as Required by Law. (2) Business Associate agrees to use and maintain appropriate safeguards and comply with applicable HIPAA Standards with respect to all PHI and to prevent use or disclosure of PHI other than as provided for in this Section of the Contract and in accordance with HIPAA Standards. (3) Business Associate agrees to use administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of electronic Protected Health Information that it creates, receives, maintains, or transmits on behalf of the Covered Entity. (4) Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to the Business Associate of a use or disclosure of PHI by Business Associate in violation of this Section of the Contract. (5) Business Associate agrees to report to Covered Entity any use or disclosure of PHI not provided for by this Section of the Contract or any Security Incident of which it becomes aware. (6) Business Associate agrees, in accordance with 45 C.F.R. 502(e)(1)(ii) and 164.308(d)(2), if applicable, to ensure that any subcontractors that create, receive, maintain or transmit PHI on behalf of the Business Associate, agree to the same restrictions, conditions, and requirements that apply to the business associate with respect to such information. (7) Business Associate agrees to provide access (including inspection, obtaining a copy or both), at the request of the Covered Entity, and in the time and manner designated by the Covered Entity, to PHI in a Designated Record Set, to Covered Entity or, as directed by Covered Entity, to an Individual in order to meet the requirements under 45 C.F.R. § 164.524. Business Associate shall not charge any fees greater than the lesser of the amount charged by the Covered Entity to an Individual for such records; the amount permitted by state law; or the Business Associate’s actual cost of postage, labor and supplies for complying with the request. (8) Business Associate agrees to make any amendments to PHI in a Designated Record Set that the Covered Entity directs or agrees to pursuant to 45 C.F.R. § 164.526 at the request of the Covered Entity, and in the time and manner designated by the Covered Entity. (9) Business Associate agrees to make internal practices, books, and records, including policies and procedures and PHI, relating to the use and disclosure of PHI received from, or created, maintained, transmitted or received by, Business Associate on behalf of Covered Entity, available to Covered Entity or to the Secretary in a time and manner agreed to by the parties or designated by the Secretary, for purposes of the Secretary investigating or determining Covered Entity’s compliance with the HIPAA Standards. (10) Business Associate agrees to document such disclosures of PHI and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. (11) Business Associate agrees to provide to Covered Entity, in a time and manner designated by the Covered Entity, information collected in accordance with subsection (g)(10) of this Section of the Contract, to permit Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. Business Associate agrees at the Covered Entity’s direction to provide an accounting of disclosures of PHI directly to an individual in accordance with 45 C.F.R. § 164.528 and section 13405 of the HITECH Act (42 U.S.C. § 17935) and any regulations promulgated thereunder. (12) Business Associate agrees to comply with any State or federal law that is more stringent than the Privacy Rule. (13) Business Associate agrees to comply with the requirements of the HITECH Act relating to privacy and security that are applicable to the Covered Entity and with the requirements of 45 C.F.R. §§ 164.504(e), 164.308, 164.310, 164.312, and 164.316. (14) In the event that an Individual requests that the Business Associate (A) restrict disclosures of PHI; (B) provide an accounting of disclosures of the Individual’s PHI; (C) provide a copy of the Individual’s PHI in an Electronic Health Record; or (D) amend PHI in the Individual’s Designated Record Set the Business Associate agrees to notify the Covered Entity, in writing, within five Days of the request. (15) Business Associate agrees that it shall not, and shall ensure that its subcontractors do not, directly or indirectly, receive any remuneration in exchange for PHI of an Individual without (A) the written approval of the Covered Entity, unless receipt of remuneration in exchange for PHI is expressly authorized by this Contract and (B) the valid authorization of the Individual, except for the purposes provided under section 13405(d)(2) of the HITECH Act, (42 U.S.C. § 17935(d)(2)) and in any accompanying regulations. (16) Obligations in the Event of a Breach. (A) The Business Associate agrees that, following the discovery by the Business Associate or by a subcontractor of the Business Associate of any use or disclosure not provided for by this section of the Contract, any breach of Unsecured protected health information, or any Security Incident, it shall notify the Covered Entity of such Breach in accordance with Subpart D of Part 164 of Title 45 of the Code of Federal Regulations and this Section of the Contract. (B) Such notification shall be provided by the Business Associate to the Covered Entity without unreasonable delay, and in no case later than 30 days after the Breach is discovered by the Business Associate, or a subcontractor of the Business Associate, except as otherwise instructed in writing by a law enforcement official pursuant to 45 C.F.R. 164.412. A Breach is considered discovered as of the first day on which it is, or reasonably should have been, known to the Business Associate or its subcontractor. The notification shall include the identification and last known address, phone number and email address of each Individual (or the next of kin of the individual if the Individual is deceased) whose Unsecured protected health information has been, or is reasonably believed by the Business Associate to have been, accessed, acquired, or disclosed during such Breach. (C) The Business Associate agrees to include in the notification to the Covered Entity at least the following information: 1. A description of what happened, including the date of the Breach; the date of the discovery of the Breach; the unauthorized person, if known, who used the PHI or to whom it was disclosed; and whether the PHI was actually acquired or viewed. 2. A description of the types of Unsecured protected health information that were involved in the Breach (such as full name, Social Security number, date of birth, home address, account number, or disability code). 3. The steps the Business Associate recommends that Individual(s) take to protect themselves from potential harm resulting from the Breach. 4. A detailed description of what the Business Associate is doing or has done to investigate the Breach, to mitigate losses, and to protect against any further Breaches. 5. Whether a law enforcement official has advised the Business Associate, either verbally or in writing, that he or she has determined that notification or notice to Individuals or the posting required under 45 C.F.R.
JOC Pricing of Itemized List of RS Means Non-Prepriced Items No response The Vendor may download the optional Pricing of Itemized List of RS Means Non-Prepriced Items form from the attachment tab, fill in the requested information, and upload the completed spreadsheet. DO NOT UPLOAD encrypted or password protected files. Valid Reference Email addresses are REQUIRED on the spreadsheet. The vendor must download the References spreadsheet from the attachment tab, fill in the requested information and upload the completed spreadsheet. DO NOT UPLOAD encrypted or password protected files.
Obligations and Activities of Business Associate Business Associate agrees to: a. Not use or disclose Protected Health Information other than as permitted or required by this BAA, the Agreement, or as required by law; b. Use appropriate safeguards, and comply with Subpart C of 45 CFR Part 164 with respect to electronic Protected Health Information, to prevent Use or Disclosure of Protected Health Information other than as provided for by this BAA; c. Report to Covered Entity any Use or Disclosure of Protected Health Information not provided for by this BAA of which it becomes aware, including breaches of Unsecured Protected Health Information as required at 45 CFR 164.410, and any Security Incident of which it becomes aware; d. In accordance with 45 CFR 164.502(e)(1)(ii) and 164.308(b)(2), if applicable, ensure that any Subcontractors that create, receive, maintain, or transmit Protected Health Information on behalf of the Business Associate agree to the same restrictions, conditions, and requirements that apply to Business Associate with respect to such information; e. Make available Protected Health Information in a Designated Record Set to Covered Entity or to an individual whose Protected Health Information is maintained by Business Associate, or the individual’s designee, and document and retain the documentation required by 45 CFR 164.530(j), as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.524; f. Make any amendment(s) to Protected Health Information in a Designated Record Set as directed or agreed to by the Covered Entity pursuant to 45 CFR 164.526, or take other measures as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.526; g. Maintain and make available the information required to provide an accounting of Disclosures to the Covered Entity as necessary to satisfy Covered Entity’s obligations under 45 CFR 164.528; h. To the extent the Business Associate is to carry out one or more of Covered Entity's obligation(s) under Subpart E of 45 CFR Part 164, comply with the requirements of Subpart E that apply to the Covered Entity in the performance of such obligation(s); and i. Make its internal practices, books, and records available to the Secretary for purposes of determining Business Associate’s or Covered Entity’s compliance with HIPAA and HIPAA Regulations.
Responsibilities of Customer 5.1 To the extent that the Supplier requires access to the Customer Site to perform the Services, the Customer shall provide such access during Normal Business Hours and to provide a suitable work environment to enable the Supplier to perform such Services subject to the Supplier complying with such internal policies and procedures of the Customer (including those relating to security and health and safety) as may be notified to the Supplier in writing from time to time. 5.2 The Customer shall co-operate with the Supplier in all matters relating to the Services and shall appoint a Representative (“Customer Representative”), who shall have authority to commit the Customer on all matters relating to the relevant Service. 5.3 The Customer agrees and acknowledges the terms of the applicable Licence Agreements, Customer Agreement and that such terms shall form part of this Agreement. For the avoidance of doubt, in the event the applicable Licence Agreements and/or Customer Agreement is not applicable to the Services being received or delivered by the Supplier to the Customer under this Agreement, such agreements shall not apply. 5.4 Customer shall; (a) adhere to the Acceptable Use Policy; (b) be a bona fide licenced user of all Third-Party Software used in the provision of the Services; (c) co-operate with the Supplier in all matters relating to the Services as reasonably requested by the Supplier; (d) adhere to the dates scheduled for provision of Services by the Supplier to the Customer as stated in the applicable Statement of Work or otherwise agreed between the Parties in writing. In the event the Customer wishes to reschedule or cancel the dates for the provision of Services, liquidated damages (“Liquidated Damages”) will become payable from the Customer to Supplier on the following basis: (i) If dates are changed or cancelled at the Customer’s request more than 14 days before the scheduled start date no Liquidated Damages are payable. (ii) If dates are changed or cancelled between 7 days and 14 days before the scheduled start date Liquidated Damages equivalent to 50% of the Fees for the Services to be provided at that time will be payable. (iii) If dates are changed or cancelled less than 7 days before the scheduled start date Liquidated Damages equivalent to 100% of the Fees for the Services to be provided at that time will be payable. (e) inform the Supplier of all health and safety rules and regulations and any other reasonable security requirements that apply at any of the Customer’s premises; (f) in respect of any Microsoft funded services, sign and deliver the Microsoft Proof of Execution (XXX) within 7 days of the date of issue by Microsoft. In the event that the Customer does not return the XXX within the 7 days’ notice period, the Supplier may be entitled to charge the Customer the amounts directly and the Customer shall follow the payment terms in this Agreement.; (g) maintain continuous global admin access to the Customer’s relevant Microsoft (h) Where a Microsoft Cloud service is deployed / utilised within the project the Customer shall assign the Supplier to be the Digital Partner of Record for a minimum of twelve (12) months from project completion date; (i) provide appropriate hardware interface, software and access authorisation to enable remote diagnosis, should such capability be required; (j) provide all information and make available all resources as reasonably requested by Supplier in the execution of its obligations under this Agreement; (k) use all reasonable efforts to follow the reasonable instructions of Supplier support personnel with respect to the resolution of defects; (l) gather all relevant information prior to requesting assistance in respect of any defects including detailed defect description, and procedures required to replicate a problem if possible. Any additional information which may help in the diagnosis of a defect should be included such as network configuration details; (m) agree that if, in the course of performing the Services, it is reasonably necessary for the Supplier’s performance of its obligations under a Statement of Work for Supplier to access or use any equipment, software or data of the Customer (or which is in the possession of the Customer) then it shall where it is able to do so grant to Supplier a non-exclusive, royalty free, terminable licence to use the same solely for the purpose of delivering the Services only for as long as is strictly necessary to deliver such Services; and (n) provide network and user access between Customer’s and Supplier’s data centres. 5.5 To the extent that the Supplier requires access to the Customer’s Operating Environment to perform the Dedicated Support, the Customer shall use reasonable endeavours to provide such access during Normal Business Hours and to provide a suitable work environment to enable the Supplier to perform such Dedicated Support subject to the Supplier complying with such internal policies and procedures of the Customer (including those relating to security and health and safety) as may be notified to the Supplier in writing from time to time. 5.6 The Customer shall (unless otherwise specified in the Statement of Work or as otherwise set out in this Agreement): (a) use the Services only for lawful purposes and in accordance with this Agreement; (b) keep secure from third parties any passwords issued to the Customer by the Supplier; (c) install or, permit the Supplier to install, the current version of software required to provide the Dedicated Support from time to time when upgrades or fixes occur and to provide a reasonable level of assistance in implementation and testing; (d) provide notice of intention to change applicable Customer-side Equipment or Customer Operating Environment or data-feeds that will directly impact the Dedicated Support; (e) comply with all applicable laws and regulations with respect to its activities under this Agreement, including those set out in Clause 20; (f) carry out all other Customer responsibilities set out in this Agreement and the Statement of Work in a timely and efficient manner. In the event of any delays in the Customer's provision of such assistance as agreed by the Parties, the Supplier may adjust any timetable or delivery schedule set out in this Agreement as reasonably necessary; (g) use the Third-Party Software and/or Software correctly in accordance with its operating instructions; (h) notify Supplier promptly of any problems with the Third-Party Software and/or Software; and (i) use only versions of the Third-Party Software and/or Software covered by Microsoft in mainstream or extended support unless otherwise agreed in writing. 5.7 In the event that the Customer is in breach of its obligations under the Agreement (excluding payment obligations) then the Supplier shall provide written notice of such breach, specifying in detail the nature of the breach and providing thirty (30) Business Days’ notice to remedy such breach if capable of remedy. If the Customer fails to remedy such breach the Supplier shall be entitled to terminate or suspend the Services without prejudice to any pre-existing rights and obligations of either Party. The Supplier shall have no liability or responsibility should the Services fail to comply with the Statement of Work and/or Service Level Agreements as a direct result of the Customer (including without limitation any of its employees, subcontractors or any of its staff) being in breach of the Agreement. 5.8 In the event that the Customer is in breach of its payment obligations under the Agreement then the Supplier shall provide written notice of such breach, specifying in detail the nature of the breach and providing thirty (30) days notice to remedy such breach if capable of remedy. If the Customer fails to remedy such breach the Supplier shall be entitled to terminate or suspend the Services without prejudice to any pre- existing rights and obligations of either Party. The Supplier shall have no liability or responsibility should the Services fail to comply with the Statement of Work and/or Service Level Agreements as a direct result of the Customer (including without limitation any of its employees, subcontractors or any of its staff) being in breach of the Agreement.
Other Activities of Administrator Nothing herein shall prevent the Administrator or its Affiliates from engaging in other businesses or, in its or their sole discretion, from acting as an administrator for any other person or entity, or in a similar capacity therefor, even though such person or entity may engage in business activities similar to those of the Issuer, the Owner Trustee or the Indenture Trustee.