Withholding Requirements In the event that any jurisdiction imposes any withholding or other tax on any payment made by Xxxxxxx Mac (or its agent, the Exchange Administrator, or any other person potentially required to withhold) with respect to a Note, Xxxxxxx Mac (or its agent, the Exchange Administrator, or such other person) will deduct the amount required to be withheld from such payment, and Xxxxxxx Mac (or its agent, the Exchange Administrator, or such other person) will not be required to pay additional interest or other amounts, or redeem or repay the Notes prior to the Maturity Date, as a result.
Compliance with Withholding Requirements Notwithstanding any other provision of this Agreement, the Trustee shall comply with all federal withholding requirements respecting payments to Certificateholders of interest or original issue discount that the Trustee reasonably believes are applicable under the Code. The consent of Certificateholders shall not be required for such withholding. In the event the Trustee does withhold any amount from interest or original issue discount payments or advances thereof to any Certificateholder pursuant to federal withholding requirements, the Trustee shall indicate the amount withheld to such Certificateholders.
Conference requirement and procedure (i) The Employer, or the Employer’s representative, shall, when requested by the Employees or their Employee Representative/ Union Delegate, confer (within a reasonable period of time which should not exceed 1/2 hour) for the purpose of determining whether or not conditions are inclement. (ii) Provided that if the Employer or the Employers’ representative refuses to confer within such reasonable period, Employees shall be entitled to cease work for the rest of the day and be paid inclement weather.
W-9 Requirement Alongside a signed copy of this Agreement, Grantee will provide Florida Housing with a properly completed Internal Revenue Service (“IRS”) Form W-9. The purpose of the W-9 form is to document the SS# or FEIN# per the IRS. Note: W-9s submitted for any other entity name other than the Grantee’s will not be accepted.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Audit Requirement If the City expend(s) seven hundred fifty thousand dollars ($750,000) or more in a year in federal financial assistance it is required to have an independent annual audit conducted in accordance with 2 CFR Part 200. A copy of the audit report shall be submitted to MoDOT within the earlier of thirty (30) days after receipt of the auditor's report(s), or nine (9) months after the end of the audit period. Subject to the requirements of 2 CFR Part 200, if the City expend(s) less than seven hundred fifty thousand dollars ($750,000) a year, the City may be exempt from auditing requirements for that year but records must be available for review or audit by applicable state and federal authorities.
Record Keeping Requirements The Training Provider must make and keep accurate Records for all Training Services in sufficient detail to allow the Department to determine compliance with this Contract (including the accuracy of claims for payment of the Funds).
Staffing Requirements Licensee will be in full compliance with the main studio staff requirements as specified by the FCC.
Reporting Requirement (1) In the event the Contractor identifies covered telecommunications equipment or services used as a substantial or essential component of any system, or as critical technology as part of any system, during contract performance, or the Contractor is notified of such by a subcontractor at any tier or by any other source, the Contractor shall report the information in paragraph (d)(2) of this clause to the Contracting Officer, unless elsewhere in this contract are established procedures for reporting the information; in the case of the Department of Defense, the Contractor shall report to the website at xxxxx://xxxxxx.xxx.xxx. For indefinite delivery contracts, the Contractor shall report to the Contracting Officer for the indefinite delivery contract and the Contracting Officer(s) for any affected order or, in the case of the Department of Defense, identify both the indefinite delivery contract and any affected orders in the report provided at xxxxx://xxxxxx.xxx.xxx. (2) The Contractor shall report the following information pursuant to paragraph (d)(1) of this clause (i) Within one business day from the date of such identification or notification: the contract number; the order number(s), if applicable; supplier name; supplier unique entity identifier (if known); supplier Commercial and Government Entity (CAGE) code (if known); brand; model number (original equipment manufacturer number, manufacturer part number, or wholesaler number); item description; and any readily available information about mitigation actions undertaken or recommended. (ii) Within 10 business days of submitting the information in paragraph (d)(2)(i) of this clause: any further available information about mitigation actions undertaken or recommended. In addition, the Contractor shall describe the efforts it undertook to prevent use or submission of covered telecommunications equipment or services, and any additional efforts that will be incorporated to prevent future use or submission of covered telecommunications equipment or services.
Minimum Vendor Legal Requirements Vendor shall remain aware of and comply with this Agreement and all local, state, and federal laws governing the sale of products/services offered by Vendor under this contract. Such applicable laws, ordinances, and policies must be complied with even if not specified herein.