Procedures and Controls Clause Samples

Procedures and Controls. The Company will maintain procedures and controls that are adequate (and otherwise comply with applicable law) to ensure that the Company and each Controlled Entity will be in compliance with all applicable U.S. Economic Sanctions laws, Anti-Money Laundering Laws and Anti-Corruption Laws.
Procedures and Controls. At all times, the School will maintain appropriate governance and managerial procedures and financial controls, which shall include but not be limited to: (1) commonly accepted accounting practices and the capacity to implement them; (2) a checking account; (3) adequate payroll procedures; (4) an organizational chart;
Procedures and Controls. Contractor shall develop procedures and controls for securely storing, distributing, counting, redeeming and tracking Market Match tokens.
Procedures and Controls. (c.1) The Distributor confirms it will at all times during the term of the contract to which these Terms and Conditions are attached: (c.1.1) have in place effective policies and procedures to ensure compliance with this Terms and Conditions (and in particular the laws referenced at clauses b.1.2 and b.1.3 above); (c.1.2) procure that its Associated Persons in respect of this Terms and Conditions and any other agreements with Sensorex are aware of and comply with the provisions of clauses (a)-(c) of this article 9 of this Term and Conditions; (c.1.3) maintain complete and accurate records of all transactions and payments related to this Terms and Conditions and any other agreement between the Distributor and Sensorex and, on reasonable request, disclose details of those transactions and payments to Sensorex; (c.1.4) on reasonable request confirm in writing to Sensorex that it has complied with the requirements of this Clause and, if so requested, allow Sensorex to verify this compliance by way of an audit of its records; and (c.1.5) immediately inform Sensorex if it suspects or becomes aware of any breach of this Clause by it or any of its Associated Persons and provide detailed information about the breach.
Procedures and Controls. The contractor shall establish and maintain procedures and controls that are adequate to assure that no information contained in its records and/or obtained from the Sheriff’s Office or from others in carrying out the functions/service under this Agreement shall be used by or disclosed by it or its employees, except as required to efficiently perform duties under the Agreement.
Procedures and Controls. At all times relevant, Och-Ziff sought business opportunities in countries with high corruption risks, including, among other places, the DRC, Libya, Chad, and Niger. Despite understanding the nature of the corruption risks presented by doing business in those countries, Och-Ziff knowingly failed to implement an adequate system of internal accounting controls and failed to enforce the internal accounting controls it did have in place, which failed to prevent bribe payments from being made in DRC, Libya, Chad, and Niger. Further, in instances where the potential improper use of proceeds was identified, Och-Ziff did not take corrective measures, obtain verification of payments or seek to exercise contractually available audit or cancellation rights.
Procedures and Controls. The HEALTH PLAN agrees to establish and maintain procedures and controls so that no information contained in its records or obtained from the STATE or from others in carrying out the terms of this Contract shall be used by or disclosed by it, its agents, officers, or employees except as provided in Section 1106 of the Social Security Act and implementing regulations.

Related to Procedures and Controls

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data. b. User Access - DST shall have a process to promptly disable access to Fund Data by any DST personnel who no longer requires such access. DST will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Procedures The Offeror shall review the list of excluded parties in the System for Award Management (▇▇▇) (▇▇▇▇▇://▇▇▇.▇▇▇.gov) for entities excluded from receiving federal awards for “covered telecommunications equipment or services”.

  • TIA Controls If any provision of this Indenture limits, qualifies, or conflicts with another provision which is required to be included in this Indenture by the TIA, the required provision shall control.