Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.
Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.
Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.
Compliance Program of the Sub-Adviser The Sub-Adviser hereby represents and warrants that: (a) in accordance with Rule 206(4)-7 under the Investment Advisers Act of 1940, as amended (the “Advisers Act”), the Sub-Adviser has adopted and implemented and will maintain written policies and procedures reasonably designed to prevent violation by the Sub-Adviser and its supervised persons (as such term is defined in the Advisers Act) of the Advisers Act and the rules the SEC has adopted under the Advisers Act; and (b) to the extent that the Sub-Adviser’s activities or services could affect a Fund, the Sub-Adviser has adopted and implemented and will maintain written policies and procedures that are reasonably designed to prevent violation of the “federal securities laws” (as such term is defined in Rule 38a-1 under the 0000 Xxx) by the Funds and the Sub-Adviser (the policies and procedures referred to in this Paragraph 7(b), along with the policies and procedures referred to in Paragraph 7(a), are referred to herein as the Sub-Adviser’s “Compliance Program”).
Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Small and medium-sized enterprises 1. The Parties will promote a favourable environment for the development of the small and medium enterprises (SME) on the basis of strengthening of the relevant private and governmental bodies, as well as the exchange of experiences and good practices with the SME. 2. Cooperation shall include, among other subjects: (a) the designing and development of mechanisms to encourage partnership and productive chain linkage development; (b) development of human resources and management skills to increase the knowledge of the Chinese and Peruvian markets; (c) defining and developing methods and strategies for clusters development; (d) increasing access to information regarding mandatory procedures and any other relevant information for an SME exporter; (e) defining technological transference: programs oriented to transfer technological innovation to SME and to improve their productivity; (f) increasing access to information on technological promotion programs for SME and financial support and encouragement programs for SME; (g) supporting new exporting SME (sponsorship, credits and guarantees, seed capital); and (h) encouraging partnership and information exchange for SME financing institutions (credits, banks, guarantee organizations, seed capital firms). 3. Cooperation shall be developed, among other activities, through: (a) information exchange; (b) conferences, seminars, experts dialogue and training programs with experts; and (c) promoting contacts between economic operators, encouraging opportunities for industrial and technical prospecting.
Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements
Wall Street Transparency and Accountability Act of 2010 The parties hereby agree that none of (i) Section 739 of the WSTAA, (ii) any similar legal certainty provision included in any legislation enacted, or rule or regulation promulgated, on or after the Trade Date, (iii) the enactment of the WSTAA or any regulation under the WSTAA, (iv) any requirement under the WSTAA or (v) any amendment made by the WSTAA shall limit or otherwise impair either party’s right to terminate, renegotiate, modify, amend or supplement this Confirmation or the Agreement, as applicable, arising from a termination event, force majeure, illegality, increased cost, regulatory change or similar event under this Confirmation, the Equity Definitions or the Agreement (including, but not limited to, any right arising from any Acceleration Event).
State Approval of Replacement Personnel The Engineer may not replace the project manager or key personnel without prior consent of the State. The State must be satisfied that the new project manager or other key personnel is qualified to provide the authorized services. If the State determines that the new project manager or key personnel is not acceptable, the Engineer may not use that person in that capacity and shall replace him or her with one satisfactory to the State within forty-five (45) days.
Transition Planning The AGENCY will be responsible for the development of the student’s Transition Plan, which begins upon entry and is completed prior to the student’s exit.