Information Sharing (a) HHSC will provide the MA Dual SNP with resources regarding the LTSS covered by Medicaid in accordance with this section.
Company Associate “Company Associate” shall mean each officer or other employee, or individual who is an independent contractor, consultant or director, of or to any of the Acquired Corporations.
Full Disclosure No written representation, warranty or other statement of Borrower in any certificate or written statement given to Bank, as of the date such representation, warranty, or other statement was made, taken together with all such written certificates and written statements given to Bank, contains any untrue statement of a material fact or omits to state a material fact necessary to make the statements contained in the certificates or statements not misleading (it being recognized by Bank that the projections and forecasts provided by Borrower in good faith and based upon reasonable assumptions are not viewed as facts and that actual results during the period or periods covered by such projections and forecasts may differ from the projected or forecasted results).
Shareholder Services Transfer Agent or its agent will investigate all inquiries from Shareholders of a Fund relating to Shareholder accounts and will respond to all communications from Shareholders and others relating to its duties hereunder and such other correspondence as may from time to time be mutually agreed upon between Transfer Agent and a Fund. Transfer Agent shall provide each Fund with reports concerning Shareholder inquires and the responses thereto by Transfer Agent, in such form and at such times as are agreed to by the Fund and Transfer Agent.
Shareholder Information Within five days after receipt of a request from the Company, the Subscriber hereby agrees to provide such information with respect to its status as a shareholder (or potential shareholder) and to execute and deliver such documents as may reasonably be necessary to comply with any and all laws and regulations to which the Company is or may become subject. Subscriber further agrees that in the event it transfers any Securities, it will require the transferee of such Securities to agree to provide such information to the Company as a condition of such transfer.
Information Sources The Custodian may rely upon information received from issuers of Investments or agents of such issuers, information received from Subcustodians and from other commercially reasonable sources such as commercial data bases and the like, but shall not be responsible for specific inaccuracies in such information, provided that the Custodian has relied upon such information in good faith, or for the failure of any commercially reasonable information provider.
Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.