Immigration Controls Sample Clauses

The Immigration Controls clause sets out requirements and obligations related to compliance with immigration laws and regulations. It typically requires parties, such as employers or contractors, to ensure that all personnel working under the agreement have the legal right to work in the relevant jurisdiction, often mandating verification of work permits or visas. This clause helps prevent legal issues arising from unauthorized employment and ensures that all parties adhere to applicable immigration standards, thereby reducing the risk of penalties or contract breaches due to non-compliance.
Immigration Controls. Provided the Seller and its Contractors comply with all applicable Laws of Pakistan, the GOP will expeditiously grant applications of the Seller (and its Contractors) for work permits, employment passes, visas, and other permits, as necessary for individuals involved in the Project. Notwithstanding the foregoing, however, the GOP may, in any individual case, decline to grant an application, or expel a person previously admitted, to protect the national security interests and public health and safety of Pakistan, as determined by the GOP.
Immigration Controls. Provided the Concessionaire and its Contractors comply with all Laws of Montenegro, the Grantor will expeditiously grant applications of the Concessionaire and its Contractors for work permits, employment passes, visas, and other permits, as necessary for individuals involved in the Project. Notwithstanding the foregoing, however, the Grantor may, in any individual case, and in accordance with the Laws of Montenegro, decline to grant an application, or expel a person previously admitted.

Related to Immigration Controls

  • Plan Controls The terms contained in the Plan are incorporated into and made a part of this Agreement and this Agreement shall be governed by and construed in accordance with the Plan. In the event of any actual or alleged conflict between the provisions of the Plan and the provisions of this Agreement, the provisions of the Plan shall be controlling and determinative.

  • Personnel Controls The County agrees to advise Contractor Staff, who have access to PII, of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non-compliance contained in applicable federal and state laws. For that purpose, the Contractor shall implement the following personnel controls:

  • TIA Controls If any provision of this Indenture limits, qualifies, or conflicts with another provision which is required to be included in this Indenture by the TIA, the required provision shall control.

  • Disclosure Controls The Company and its subsidiaries maintain an effective system of “disclosure controls and procedures” (as defined in Rule 13a-15(e) of the Exchange Act) that complies with the requirements of the Exchange Act and that has been designed to ensure that information required to be disclosed by the Company in reports that it files or submits under the Exchange Act is recorded, processed, summarized and reported within the time periods specified in the Commission’s rules and forms, including controls and procedures designed to ensure that such information is accumulated and communicated to the Company’s management as appropriate to allow timely decisions regarding required disclosure. The Company and its subsidiaries have carried out evaluations of the effectiveness of their disclosure controls and procedures as required by Rule 13a-15 of the Exchange Act.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.