State Monitoring A Clause Samples

State Monitoring A 

Related to State Monitoring A

  • Program Monitoring and Evaluation The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”

  • Monitoring and Evaluation a. The AGENCY shall expeditiously provide to the COUNTY upon request, all data needed for the purpose of monitoring, evaluating and/or auditing the program(s). This data shall include, but not be limited to, clients served, services provided, outcomes achieved, information on materials and services delivered, and any other data required, in the sole discretion of the COUNTY, that may be required to adequately monitor and evaluate the services provided under this Contract. Monitoring shall be performed in accordance with COUNTY’S established Noncompliance Standards, a copy of which is attached hereto and incorporated by reference as Attachment “C”. b. The AGENCY agrees to permit persons duly authorized by the COUNTY to interview any clients and all current and/or former employees of the AGENCY to be assured of the AGENCY’S satisfactory performance of the terms of this Contract. c. Following such evaluation, monitoring, and/or audit, the COUNTY will deliver a report of its findings and recommendations with regard to the AGENCY’S conformance with this Contract’s terms and conditions to the AGENCY and/or Board of Directors’ President, and members, whenever applicable. If deficiencies are noted, a written notice of corrective action will be issued to the AGENCY which will specify deficiencies and provide a timeline for correction of those deficiencies. Within the designated timeframe in the written notice of corrective action, the AGENCY shall submit to the COUNTY’S CCC manager (“Manager”), or their designee, a corrective action plan to rectify all deficiencies identified by the COUNTY. d. Failure by the AGENCY to correct noted deficiencies, as outlined in the written notice of corrective action, may result in the AGENCY being deemed in breach of the Contract terms. e. The AGENCY shall cooperate with the COUNTY on all reviews to ensure compliance with all applicable COUNTY guidelines and requirements for general fund recipients.

  • Monitoring Arrangements (i) Summary details of the service provided by the HR team will be monitored by the Service Provider and will be discussed with the Client as part of agreed annual review procedures; (ii) Any concerns arising on the part of the Client or Service Provider regarding the operation of this Agreement should be highlighted as soon as possible so that the matter causing concern can be addressed at the earliest opportunity.

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

  • Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.