Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.
Contractor Responsibility and Debarment The following requirements set forth in the County’s Non-Responsibility and Debarment Ordinance (Title 2, Chapter 2.202 of the County Code) are effective for this Agreement, except to the extent applicable State and/or federal laws are inconsistent with the terms of the Ordinance. A. A responsible Contractor is a Contractor who has demonstrated the attribute of trustworthiness, as well as quality, fitness, capacity and experience to satisfactorily perform the contract. It is the County’s policy to conduct business only with responsible contractors. B. The Contractor is hereby notified that, in accordance with Chapter 2.202 of the County Code, if the County acquires information concerning the performance of the Contractor on this or other Agreements which indicates that the Contractor is not responsible, the County may, in addition to other remedies provided in the Agreement, debar the Contractor from bidding or proposing on, or being awarded, and/or performing work on County Agreements for a specified period of time, which generally will not exceed five years but may exceed five years or be permanent if warranted by the circumstances, and terminate any or all existing Agreements the Contractor may have with the County. C. The County may debar a Contractor if the Board of Supervisors finds, in its discretion, that the Contractor has done any of the following: (1) violated a term of an Agreement with the County or a nonprofit corporation created by the County; (2) committed an act or omission which negatively reflects on the Contractor’s quality, fitness or capacity to perform a contract with the County, any other public entity, or a nonprofit corporation created by the County, or engaged in a pattern or practice which negatively reflects on same; (3) committed an act or offense which indicates a lack of business integrity or business honesty, or (4) made or submitted a false claim against the County or any other public entity. D. If there is evidence that the Contractor may be subject to debarment, the Department will notify the Contractor in writing of the evidence which is the basis for the proposed debarment and will advise the Contractor of the scheduled date for a debarment hearing before the Contractor Hearing Board. E. The Contractor Hearing Board will conduct a hearing where evidence on the proposed debarment is presented. The Contractor and/or the Contractor’s representative shall be given an opportunity to submit evidence at that hearing. After the hearing, the Contractor Hearing Board shall prepare a tentative proposed decision, which shall contain a recommendation regarding whether the contractor should be debarred, and, if so, the appropriate length of time of the debarment. The Contractor and the Department shall be provided an opportunity to object to the tentative proposed decision prior to its presentation to the Board of Supervisors. F. After consideration of any objections, or if no objections are submitted, a record of the hearing, the proposed decision and any other recommendation of the Contractor Hearing Board shall be presented to the Board of Supervisors. The Board of Supervisors shall have the right to modify, deny or adopt the proposed decision and recommendation of the Hearing Board. G. If a Contractor has been debarred for a period longer than five (5) years, that Contractor may, after the debarment has been in effect for at least five (5) years, submit a written request for review of the debarment determination to reduce the period of debarment or terminate the debarment. The County may, in its discretion, reduce the period of debarment or terminate the debarment if it finds that the Contractor has adequately demonstrated one or more of the following: (1) elimination of the grounds for which the debarment was imposed; (2) a bona fide change in ownership or management; (3) material evidence discovered after debarment was imposed; or (4) any other reason that is in the best interests of the County. H. The Contractor Hearing Board will consider a request for review of a debarment determination only where (1) the Contractor has been debarred for a period longer than five (5) years; (2) the debarment has been in effect for at least five (5) years; and (3) the request is in writing, states one or more of the grounds for reduction of the debarment period or termination of the debarment, and includes supporting documentation. Upon receiving an appropriate request, the Contractor Hearing Board will provide notice of the hearing on the request. At the hearing, the Contractor Hearing Board shall conduct a hearing where evidence on the proposed reduction of debarment period or termination of debarment is presented. This hearing shall be conducted and the request for review decided by the Contractor Hearing Board pursuant to the same procedures as for a debarment hearing. I. The Contractor Hearing Board’s proposed decision shall contain a recommendation on the request to reduce the period of debarment or terminate the debarment. The Contractor Hearing Board shall present its proposed decision and recommendation to the Board of Supervisors. The Board of Supervisors shall have the right to modify, deny, or adopt the proposed decision and recommendation of the Contractor Hearing Board. J. These terms shall also apply to subcontractors of County Contractors.
Xxxxxxx Xxxxxxx/Market Abuse Laws You acknowledge that, depending on your country or broker’s country, or the country in which Common Stock is listed, you may be subject to xxxxxxx xxxxxxx restrictions and/or market abuse laws in applicable jurisdictions, which may affect your ability to accept, acquire, sell or attempt to sell, or otherwise dispose of the shares of Common Stock, rights to shares of Common Stock (e.g., RSUs) or rights linked to the value of Common Stock, during such times as you are considered to have “inside information” regarding the Company (as defined by the laws or regulations in applicable jurisdictions, including the United States and your country). Local xxxxxxx xxxxxxx laws and regulations may prohibit the cancellation or amendment of orders you placed before possessing inside information. Furthermore, you may be prohibited from (i) disclosing insider information to any third party, including fellow employees and (ii) “tipping” third parties or causing them to otherwise buy or sell securities. Any restrictions under these laws or regulations are separate from and in addition to any restrictions that may be imposed under any applicable Company xxxxxxx xxxxxxx policy. You acknowledge that it is your responsibility to comply with any applicable restrictions, and you should speak to your personal advisor on this matter.
Wall Street Transparency and Accountability Act of 2010 The parties hereby agree that none of (i) Section 739 of the WSTAA, (ii) any similar legal certainty provision included in any legislation enacted, or rule or regulation promulgated, on or after the Trade Date, (iii) the enactment of the WSTAA or any regulation under the WSTAA, (iv) any requirement under the WSTAA or (v) any amendment made by the WSTAA shall limit or otherwise impair either party’s right to terminate, renegotiate, modify, amend or supplement this Confirmation or the Agreement, as applicable, arising from a termination event, force majeure, illegality, increased cost, regulatory change or similar event under this Confirmation, the Equity Definitions or the Agreement (including, but not limited to, any right arising from any Acceleration Event).
OF CLEAN AIR ACT AND FEDERAL WATER POLLUTION CONTROL ACT This provision is applicable to all Federal-aid construction contracts and to all related subcontracts. By submission of this bid/proposal or the execution of this contract, or subcontract, as appropriate, the bidder, proposer, Federal-aid construction contractor, or subcontractor, as appropriate, will be deemed to have stipulated as follows: 1. That any person who is or will be utilized in the performance of this contract is not prohibited from receiving an award due to a violation of Section 508 of the Clean Water Act or Section 306 of the Clean Air Act. 2. That the contractor agrees to include or cause to be included the requirements of paragraph (1) of this Section X in every subcontract, and further agrees to take such action as the contracting agency may direct as a means of enforcing such requirements.
Clean Air Act and Federal Water Pollution Control Act The contractor agrees to comply with all applicable standards, orders or regulations issued pursuant to the Clean Air Act, as amended, 42 U.S.C. § 7401 et seq.
Notice of Criminal Activity and Disciplinary Actions a. Xxxxxxx shall immediately report in writing to their contract manager when Xxxxxxx has knowledge or any reason to believe that they or any person with ownership or controlling interest in the organization/business, or their agent, employee, contractor or volunteer that is providing services under this Contract has: 1. Engaged in any activity that could constitute a criminal offense equal to or greater than a Class A misdemeanor or grounds for disciplinary action by a state or federal regulatory authority; or 2. Been placed on community supervision, received deferred adjudication, or been indicted for or convicted of a criminal offense relating to involvement in any financial matter, federal or state program or felony sex crime. b. Grantee shall not permit any person who engaged, or was alleged to have engaged, in any activity subject to reporting under this section to perform direct client services or have direct contact with clients, unless otherwise directed in writing by the System Agency.
Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.