FRAUD AND PROGRAM INTEGRITY POLICY Sample Clauses

FRAUD AND PROGRAM INTEGRITY POLICY. HACK is committed to the prevention, detection, and elimination of Low Income Public Housing (LIPH) Program abuse and fraud. Accordingly, the following policies and procedures will be observed in the administration of the LIPH Program by HACK staff.
AutoNDA by SimpleDocs

Related to FRAUD AND PROGRAM INTEGRITY POLICY

  • Safety Policy Each employer is required by law to have a safety policy and program. TIR will ask for and may require a copy of that policy and program.

  • SPAM POLICY You are strictly prohibited from using the Website or any of the Company's Services for illegal spam activities, including gathering email addresses and personal information from others or sending any mass commercial emails.

  • Security Policy As part of PCI DSS, the Card Organizations require that you have a security policy that covers the security of credit card information.

  • Anti-­‐Abuse Policy i. Registry Operator’s Anti-­‐Abuse Policy will be required under the Registry Registrar Agreement and posted on the Registry Operator’s web site.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Quality Assurance Program An employee shall be entitled to leave of absence without loss of earnings from her or his regularly scheduled working hours for the purpose of writing examinations required by the College of Nurses of Ontario arising out of the Quality Assurance Program.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • PROCUREMENT ETHICS Contractor understands that a person who is interested in any way in the sale of any supplies, services, construction, or insurance to the State of Utah is violating the law if the person gives or offers to give any compensation, gratuity, contribution, loan, reward, or any promise thereof to any person acting as a procurement officer on behalf of the State of Utah, or who in any official capacity participates in the procurement of such supplies, services, construction, or insurance, whether it is given for their own use or for the use or benefit of any other person or organization.

  • University Policies Contractor shall, at no additional cost to the University, comply with all policies and procedures of the University. Current policies are available at xxxx://xxxxxx.xxxxx.xxx/ and include without limitation, the University’s smoking policy available at xxxx://xxxxxx.xxxxx.xxx/2011/06/02/smoking/. In the event the University establishes new policies or procedures following execution of the contract, or makes modifications to policies or procedures in existence at the time of contract execution, Contractor shall comply with such new or modified policies or procedures upon written notice.

Time is Money Join Law Insider Premium to draft better contracts faster.