CHAIN OF CUSTODY SYSTEM Sample Clauses

CHAIN OF CUSTODY SYSTEM. 5.1 Standard Operating Procedures A set of standard operating procedures (SOP) has been developed to lay down (a) how forest companies control their supply chains and (b) how these company activities are verified with the help of the COCS:
AutoNDA by SimpleDocs

Related to CHAIN OF CUSTODY SYSTEM

  • Bulk Registration Data Access to Icann Periodic Access to Thin Registration Data. In order to verify and ensure the operational stability of Registry Services as well as to facilitate compliance checks on accredited registrars, Registry Operator will provide ICANN on a weekly basis (the day to be designated by ICANN) with up-to-date Registration Data as specified below. Data will include data committed as of 00:00:00 UTC on the day previous to the one designated for retrieval by ICANN.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • Securities Depositories and Book-Entry Systems The Custodian may deposit and/or maintain Securities of the Fund in a Securities Depository or in a Book-Entry System, subject to the following provisions:

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Custodian or Foreign Securities System The Custodian may hold foreign securities for all of its customers, including the Portfolios, with any Foreign Sub-Custodian in an account that is identified as belonging to the Custodian for the benefit of its customers, provided however, that (i) the records of the Custodian with respect to foreign securities of the Portfolios which are maintained in such account shall identify those securities as belonging to the Portfolios and (ii), to the extent permitted and customary in the market in which the account is maintained, the Custodian shall require that securities so held by the Foreign Sub-Custodian be held separately from any assets of such Foreign Sub-Custodian or of other customers of such Foreign Sub-Custodian.

  • Transactions in Foreign Custody Account (a) Except as otherwise provided in paragraph (b) of this Section 3.8, the provision of Sections 2.2 and 2.7 of this Contract shall apply, mutatis mutandis to the foreign securities of the Fund held outside the United States by foreign sub-custodians.

  • Book-Entry System Book-Entry System shall mean the Federal Reserve-Treasury Department Book Entry System for United States government, instrumentality and agency securities operated by the Federal Reserve Bank, its successor or successors and its nominee or nominees.

  • Use of Book-Entry System PFPC Trust is authorized and instructed, on a continuous basis, to deposit in the Book-Entry System all securities belonging to the Portfolios eligible for deposit therein and to utilize the Book-Entry System to the extent possible in connection with settlements of purchases and sales of securities by the Portfolios, and deliveries and returns of securities loaned, subject to repurchase agreements or used as collateral in connection with borrowings. PFPC Trust shall continue to perform such duties until it receives Written Instructions or Oral Instructions authorizing contrary actions. PFPC Trust shall administer the Book-Entry System as follows:

  • ELECTRONIC FUNDS TRANSFER (EFT The recipient/cooperator shall designate a financial institution or an authorized payment agent through which a federal payment may be made in accordance with US Treasury Regulations, Money and Finance at 00 XXX 000, which requires that federal payments are to be made by EFT to the maximum extent possible. A waiver may be requested and payments received by check by certifying in writing that one of the following situations apply:

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

Time is Money Join Law Insider Premium to draft better contracts faster.