Manager as Third Party Administrator Clause Samples

Manager as Third Party Administrator. Provided that Client designates Manager as its third party administrator ("TPA") and authorizes Manager to file on its behalf by submitting the appropriate authorization letter with the NAIC Securities Valuation Office ("SVO"), Manager shall act as NAIC TPA in order to provide quarterly and/or annual NAIC prices and ratings, and to monitor securities in the Account to determine whether NAIC registration is required. Manager shall not charge a fee for acting as NAIC TPA. Manager shall have no obligation to pay any filing fees or other fees which may be required by NAIC and shall pass along notice of such fees to Client. Client shall send Manager a copy of the authorization letter sent to the SVO as confirmation of the TPA designation. AGREED TO AND ACCEPTED BY: General-Re New England US Alliance Corporation Asset Management, Inc. By: ▇▇▇▇▇▇ ▇. ▇▇▇▇▇ By: ▇▇▇▇ ▇. ▇▇▇▇▇ Its: Chief Executive Officer Its: President Principal Address: Principal Address

Related to Manager as Third Party Administrator

  • Third Party Administrators for Defined Contribution Plans 2.1 The Fund may decide to make available to certain of its customers, a qualified plan program (the “Program”) pursuant to which the customers (“Employers”) may adopt certain plans of deferred compensation (“Plan or Plans”) for the benefit of the individual Plan participant (the “Plan Participant”), such Plan(s) being qualified under Section 401(a) of the Code and administered by TPAs which may be plan administrators as defined in the Employee Retirement Income Security Act of 1974, as amended. 2.2 In accordance with the procedures established in Schedule 2.1 entitled “Third Party Administrator Procedures,” as may be amended by the Transfer Agent and the Fund from time to time (“Schedule 2.1”), the Transfer Agent shall: (a) Treat Shareholder accounts established by the Plans in the name of the Trustees, Plans or TPAs, as the case may be, as omnibus accounts; (b) Maintain omnibus accounts on its records in the name of the TPA or its designee as the Trustee for the benefit of the Plan; and (c) Perform all Services under Section 1 as transfer agent of the Funds and not as a record-keeper for the Plans. 2.3 Transactions identified under Sections 1 and 2 of this Agreement shall be deemed exception services (“Exception Services”) when such transactions: (a) Require the Transfer Agent to use methods and procedures other than those usually employed by the Transfer Agent to perform transfer agency and recordkeeping services; (b) Involve the provision of information to the Transfer Agent after the commencement of the nightly processing cycle of the TA2000 System; or (c) Require more manual intervention by the Transfer Agent, either in the entry of data or in the modification or amendment of reports generated by the TA2000 System, than is normally required.

  • Consider Provider as School Official The Parties agree that Provider is a “school official” under FERPA and has a legitimate educational interest in personally identifiable information from education records received from the LEA pursuant to the DPA. For purposes of the Service Agreement and this DPA, Provider: (1) provides a service or function for which the LEA would otherwise use employees; (2) is under the direct control of the LEA with respect to the use and maintenance of education records; and (3) is subject to the requirements of FERPA governing the use and redisclosure of personally identifiable information from the education records received from the LEA.

  • No Action by Administrator Notwithstanding anything to the contrary in this Agreement, the Administrator shall not be obligated to, and shall not, take any action that the Issuer directs the Administrator not to take or which would result in a violation or breach of the Issuer’s covenants, agreements or obligations under any of the Issuer Documents.

  • Security Administrator and Authorized Users Grantee shall: 1. designate a Security Administrator and a back-up Security Administrator. The Security Administrator is required to implement and maintain a system for management of user accounts/user roles to ensure that all the CMBHS user accounts are current. 2. have a security policy that ensures adequate system security and protection of confidential information. 3. notify the CMBHS Help-desk within ten (10) business days of any change to the designated Security Administrator or the back-up Security Administrator. Grantee will: i. ensure that access to CMBHS is restricted to only currently authorized users. ii. within 24 hours, remove access to users who are no longer authorized to have access to secure data in CMBHS. iii. maintain the CMBHS Authorized Users List which includes former and current Grantee’s employees, contracted labor, subcontractors or any other users authorized to have access to secure data in CMBHS. The CMBHS Authorized Users List shall document whose authority has been added and terminated; and the date the authority was added and terminated. 4. submit the CMBHS Security Attestation Form and the CMBHS Authorized Users List as stated in Attachment A, to the following e-mail address: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.

  • Program Administration An activity relating to the general management, oversight and coordination of community development programs. Costs directly related to carrying out eligible activities are not included.