Procedures The Offeror shall review the list of excluded parties in the System for Award Management (▇▇▇) (▇▇▇▇▇://▇▇▇.▇▇▇.gov) for entities excluded from receiving federal awards for “covered telecommunications equipment or services”.
Pending Procedures and Examinations The Registration Statement is not the subject of a pending proceeding or examination under Section 8(d) or 8(e) of the 1933 Act, and the Company is not the subject of a pending proceeding under Section 8A of the 1933 Act in connection with the offering of the Securities.
Claim Procedures Claim forms or claim information as to the subject policy can be obtained by contacting Benmark, Inc. (800-544-6079). When the Named Fiduciary has a claim which may be covered under the provisions described in the insurance policy, they should contact the office named above, and they will either complete a claim form and forward it to an authorized representative of the Insurer or advise the named Fiduciary what further requirements are necessary. The Insurer will evaluate and make a decision as to payment. If the claim is payable, a benefit check will be issued in accordance with the terms of this Agreement. In the event that a claim is not eligible under the policy, the Insurer will notify the Named Fiduciary of the denial pursuant to the requirements under the terms of the policy. If the Named Fiduciary is dissatisfied with the denial of the claim and wishes to contest such claim denial, they should contact the office named above and they will assist in making an inquiry to the Insurer. All objections to the Insurer's actions should be in writing and submitted to the office named above for transmittal to the Insurer.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Procedure If any action is brought against an Underwriter, a Selected Dealer or a Controlling Person in respect of which indemnity may be sought against the Company pursuant to Section 6.1, such Underwriter, such Selected Dealer or Controlling Person, as the case may be, shall promptly notify the Company in writing of the institution of such action and the Company shall assume the defense of such action, including the employment and fees of counsel (subject to the reasonable approval of such Underwriter or such Selected Dealer, as the case may be) and payment of actual expenses. Such Underwriter, such Selected Dealer or Controlling Person shall have the right to employ its or their own counsel in any such case, but the fees and expenses of such counsel shall be at the expense of such Underwriter, such Selected Dealer or Controlling Person unless (i) the employment of such counsel at the expense of the Company shall have been authorized in writing by the Company in connection with the defense of such action, or (ii) the Company shall not have employed counsel to have charge of the defense of such action, or (iii) such indemnified party or parties shall have reasonably concluded that there may be defenses available to it or them which are different from or additional to those available to the Company (in which case the Company shall not have the right to direct the defense of such action on behalf of the indemnified party or parties), in any of which events the reasonable fees and expenses of not more than one additional firm of attorneys selected by such Underwriter (in addition to local counsel), Selected Dealer and/or Controlling Person shall be borne by the Company. Notwithstanding anything to the contrary contained herein, if any Underwriter, Selected Dealer or Controlling Person shall assume the defense of such action as provided above, the Company shall have the right to approve the terms of any settlement of such action which approval shall not be unreasonably withheld.