Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.
Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.
Anti-Money Laundering/International Trade Law Compliance No Covered Entity is a Sanctioned Person. No Covered Entity, either in its own right or through any third party, (i) has any of its assets in a Sanctioned Country or in the possession, custody or control of a Sanctioned Person in violation of any Anti-Terrorism Law; (ii) does business in or with, or derives any of its income from investments in or transactions with, any Sanctioned Country or Sanctioned Person in violation of any Anti-Terrorism Law; or (iii) engages in any dealings or transactions prohibited by any Anti-Terrorism Law.
Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements
Other Regulatory Approvals All necessary approvals, authorizations and consents of any governmental or regulatory entity required to consummate the Merger shall have been obtained and remain in full force and effect, and all waiting periods relating to such approvals, authorizations and consents shall have expired or been terminated.
CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.
State Approval of Replacement Personnel The Engineer may not replace the project manager or key personnel without prior consent of the State. The State must be satisfied that the new project manager or other key personnel is qualified to provide the authorized services. If the State determines that the new project manager or key personnel is not acceptable, the Engineer may not use that person in that capacity and shall replace him or her with one satisfactory to the State within forty-five (45) days.
Anti-Corruption Laws and Sanctions The Borrower has implemented and maintains in effect policies and procedures designed to ensure compliance by the Borrower, its Subsidiaries and their respective directors, officers, employees and agents with Anti-Corruption Laws and applicable Sanctions, and the Borrower, its Subsidiaries and their respective officers and employees and to the knowledge of the Borrower its directors and agents, are in compliance with Anti-Corruption Laws and applicable Sanctions in all material respects. None of (a) the Borrower, any Subsidiary or any of their respective directors, officers or employees, or (b) to the knowledge of the Borrower, any agent of the Borrower or any Subsidiary that will act in any capacity in connection with or benefit from the credit facility established hereby, is a Sanctioned Person. No Borrowing or Letter of Credit, use of proceeds or other transaction contemplated by this Agreement will violate any Anti-Corruption Law or applicable Sanctions.
Cooperation with Economic Studies If ICANN initiates or commissions an economic study on the impact or functioning of new generic top-‐level domains on the Internet, the DNS or related matters, Registry Operator shall reasonably cooperate with such study, including by delivering to ICANN or its designee conducting such study all data related to the operation of the TLD reasonably necessary for the purposes of such study requested by ICANN or its designee, provided, that Registry Operator may withhold (a) any internal analyses or evaluations prepared by Registry Operator with respect to such data and (b) any data to the extent that the delivery of such data would be in violation of applicable law. Any data delivered to ICANN or its designee pursuant to this Section 2.15 that is appropriately marked as confidential (as required by Section 7.15) shall be treated as Confidential Information of Registry Operator in accordance with Section 7.15, provided that, if ICANN aggregates and makes anonymous such data, ICANN or its designee may disclose such data to any third party. Following completion of an economic study for which Registry Operator has provided data, ICANN will destroy all data provided by Registry Operator that has not been aggregated and made anonymous.
Certified and Minority Business Enterprises Reports Upon Customer request, the Contractor shall report to the requesting Customer the Contractor’s spend with certified and other minority business enterprises in the provision of commodities or services related to the Customer’s orders. These reports shall include the period covered, the name, minority code, and Federal Employer Identification Number of each minority business utilized during the period; commodities and services provided by the minority business enterprise, and the amount paid to each minority business enterprise on behalf of the Customer.