Contract Use by State Agencies To the extent applicable, the Contract does not prohibit state agencies from using their delegated purchasing authority to procure similar goods and services from other sources.
Non-State Agencies Participation in Centralized Contracts New York State political subdivisions and others authorized by New York State law may participate in Centralized Contracts. These include, but are not limited to local governments, public authorities, public school and fire districts, public and nonprofit libraries, and certain other nonpublic/nonprofit organizations. See "Participation in Centralized Contracts" in Appendix B, General Specifications January 2015 22772 Project Based Information Technology Consulting (Statewide). Upon request, all eligible non-State agencies must furnish Contractors with the proper tax exemption certificates and documentation certifying eligibility to use State contracts. Questions regarding an organization's eligibility to purchase from New York State Contracts may also be directed to OGS Customer Services at 000-000-0000.
OFFICE OF MANAGEMENT AND BUDGET (OMB) AUDIT REQUIREMENTS The parties shall comply with the requirements of the Single Audit Act of 1984, P.L. 98-502, ensuring that the single audit report includes the coverage stipulated in 2 CFR 200.
Audit Requirements for Recipients of State Financial Assistance For purposes of this paragraph, the word "Contractor" shall be deemed to mean "nonstate entity," as that term is defined in section 4-230 of the Connecticut General Statutes. The Contractor shall provide for an annual financial audit acceptable to the Client Agency for any expenditure of State awarded funds made by the Contractor. Such audit shall include management letters and audit recommendations. The State Auditors of Public Accounts shall have access to all records and accounts for the fiscal year(s) in which the award was made. The Contractor shall comply with federal and State single audit standards as applicable.
Certain State Law Requirements for Contracts The contents of this Section are required by Texas Law and are included by County regardless of content. For purposes of Sections 2252.152, 2271.002, and 2274.002, Texas Government Code, as amended, C&T hereby verifies that C&T and any parent company, wholly owned subsidiary, majority-owned subsidiary, and affiliate: a. Unless affirmatively declared by the United States government to be excluded from its federal sanctions regime relating to Sudan or Iran or any federal sanctions regime relating to a foreign terrorist organization, is not identified on a list prepared and maintained by the Texas Comptroller of Public Accounts under Sections 806.051, 807.051, or 2252.153 of the Texas Government Code. b. If employing ten (10) or more full-time employees and this Agreement has a value of
Food Service Waste Reduction Requirements Contractor shall comply with the Food Service Waste Reduction Ordinance, as set forth in San Francisco Environment Code Chapter 16, including but not limited to the remedies for noncompliance provided therein.
Reports to Rating Agencies The Servicer shall deliver to each Rating Agency, at such address as such Rating Agency may request, a copy of all reports or notices furnished or delivered pursuant to this Article III and a copy of any amendments, supplements or modifications to this Agreement and any other information reasonably requested by such Rating Agency to monitor this transaction. If CarMax is no longer the Servicer, the successor Servicer shall provide any required Rating Agency notices, reports or other communications to the Depositor, who promptly shall provide such notices, reports or communications to the Rating Agencies.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
Liquidation Reports Upon the foreclosure sale of any Mortgaged Property or the acquisition thereof by the Purchaser pursuant to a deed in lieu of foreclosure, the Company shall submit to the Purchaser a liquidation report with respect to such Mortgaged Property.
Supplemental Provisions for Resecuritization This Agreement may be supplemented by means of the addition of a separate Article hereto (a "Supplemental Article") for the purpose of resecuritizing any of the Certificates issued hereunder, under the following circumstances. With respect to any Class or Classes of Certificates issued hereunder, or any portion of any such Class, as to which the Company or any of its Affiliates (or any designee thereof) is the registered Holder (the "Resecuritized Certificates"), the Company may deposit such Resecuritized Certificates into a new REMIC, grantor trust, FASIT or custodial arrangement (a "Restructuring Vehicle") to be held by the Trustee pursuant to a Supplemental Article. The instrument adopting such Supplemental Article shall be executed by the Company, the Master Servicer and the Trustee; provided, that neither the Master Servicer nor the Trustee shall withhold their consent thereto if their respective interests would not be materially adversely affected thereby. To the extent that the terms of the Supplemental Article do not in any way affect any provisions of this Agreement as to any of the Certificates initially issued hereunder, the adoption of the Supplemental Article shall not constitute an "amendment" of this Agreement. Each Supplemental Article shall set forth all necessary provisions relating to the holding of the Resecuritized Certificates by the Trustee, the establishment of the Restructuring Vehicle, the issuing of various classes of new certificates by the Restructuring Vehicle and the distributions to be made thereon, and any other provisions necessary for the purposes thereof. In connection with each Supplemental Article, the Company shall deliver to the Trustee an Opinion of Counsel to the effect that (i) the Restructuring Vehicle will qualify as a REMIC, grantor trust, FASIT or other entity not subject to taxation for federal income tax purposes and (ii) the adoption of the Supplemental Article will not endanger the status of the Trust Fund as a REMIC or (subject to Section 10.01(f)) result in the imposition of a tax upon the Trust Fund (including but not limited to the tax on prohibited transactions as defined in Section 860F(a)(2) of the Code and the tax on contributions to a REMIC as set forth in Section 860G(d) of the Code).