Compliance Mechanisms Sample Clauses

Compliance Mechanisms. The Licensed Program(s) may contain technological copy protection or other security features designed to prevent unauthorized use of the Licensed Program(s), including features to protect against use of the Licensed Program(s): (a) beyond the scope of the license granted to pursuant to Section 2.1; or (b) prohibited in Section 2.3. Licensee shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.
AutoNDA by SimpleDocs
Compliance Mechanisms. CCH eLending may contain technological copy protection or other security features designed to prevent unauthorised use of CCH eLending or materials accessible via CCH eLending, including features designed to protect against use of CCH eLending:
Compliance Mechanisms. Compliance with this Agreement will be ensured through ongoing communications among the Parties to this Agreement, periodic reporting of air tour operations by New York Helicopter Charter Inc. as described in 5.4 of this Section, and enforcement measures if necessary. The Parties agree to work together to address any possible compliance issues.
Compliance Mechanisms. The Product(s) may contain technological copy protection or other security features designed to prevent unauthorized use of the Products, including features to protect against use of the Product(s):
Compliance Mechanisms. The Hosted Application may contain technological copy protection or other security features designed to prevent unauthorized use of the Hosted Application, including features to protect against use of the Hosted Application: (a) beyond the scope of the license granted to pursuant to subsection 2.1; or (b) prohibited in subsection 2.2. Customer shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features. Unauthorized Acquisition. CCH SFS expressly prohibits the use of any product or service from CCH SFS that has been improperly obtained and/or accessed. For purposes of illustration, but not limitation, examples include any product or service that: (a) is acquired from an unauthorized reseller or distributor; (b) is pirated, cracked or hacked, including through the use of Online Account Access Information established for use by another individual; (c) has been acquired with the intent or for the purpose to use in a manner that is illegal, fraudulent, in violation of this Agreement or otherwise outside the normal, stated and/or reasonably understood purpose of such product or service; or (d) is acquired with the use of false or inaccurate statements and/or information (e.g., false name, contact information, or payment information; or false declaration of the total number of end users).
Compliance Mechanisms. The Application may contain technological copy protection or other security features designed to prevent unauthorized use of the Application, including features to protect against use of the Application: (a) beyond the scope of the license granted to pursuant to subsection 2.1; or (b) prohibited in subsection 2.2. Customer shall not, and shall not attempt to, remove, disable, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.
Compliance Mechanisms. Enforcement of a company’s code of conduct is critical. Compliance officers should be accessible so that employees will feel comfortable discussing any of their compliance questions or concerns. • Creating reporting mechanisms with adequate policies on confidentiality and non- retaliation as well as other safeguards related to reporting is extremely important. • Whistleblowing protections, suggestion boxes, or “Help-lines” facilitate detection and reporting of questionable conduct. “I think I may have made a mistake.” An effective and non-threatening environment that encourages reporting and questions is important to assist employees and agents (especially those in the field) when confronted with questionable situations. • Companies should provide guidance to assist employees and agents on how to cope with and resolve difficult situations. Such counseling not only protects the person in the field, it also protects the company.
AutoNDA by SimpleDocs

Related to Compliance Mechanisms

  • Compliance Audit LEA shall have the right but shall be under no obligation to conduct audit(s), from time to time, of Provider’s records concerning its compliance obligations as set forth in this Article V. Provider shall make such records and other documents available to LEA upon request.

  • Compliance Audits D.4.1 Compliance Audit(s). Without limiting the generality of section A.7.4 (Records Review), if requested by the Province from time to time, which request shall be at the Province’s sole discretion, the Recipient, at its own expense, will forthwith retain an independent third party auditor to conduct one or more compliance audits of the Recipient or any Project. The audit will be conducted in accordance with Canadian Generally Accepted Auditing Standards, as adopted by the Canadian Institute of Chartered Accountants, applicable as of the date on which a record is kept or required to be kept under such standards. In addition, the audit will assess the Recipient’s compliance with the terms of the Agreement and will address, with respect to each Project, without limitation, the following:

  • Forecasting Requirements 19.5.1 The Parties shall exchange technical descriptions and forecasts of their Interconnection and traffic requirements in sufficient detail necessary to establish the Interconnections necessary for traffic completion to and from all Customers in their respective designated service areas.

  • Compliance Monitoring Grantee must be subject to compliance monitoring during the period of performance in which funds are Expended and up to three years following the closeout of all funds. In order to assure that the program can be adequately monitored, the following is required of Grantee:

  • Compliance Requirements K. If using volunteers as provided for in this Contract during FY19, which encompasses the Contract term of July 1, 2019 to June 30, 2020, then the Grantee must either:

  • Testing Requirements 12.1. Workplaces -

  • Compliance Plan (1) This paragraph (h) applies to any portion of the contract that—

  • Compliance Matters (a) The Sub-Adviser understands and agrees that it is a “service provider” to the Trust as contemplated by Rule 38a-1 under the 1940 Act. As such, the Sub-Adviser agrees to cooperate fully with the Adviser and the Trust and its Trustees and officers, including the Fund’s CCO, with respect to (i) any and all compliance-related matters, and (ii) the Trust’s efforts to assure that each of its service providers adopts and maintains policies and procedures that are reasonably designed to prevent violation of the “federal securities laws” (as that term is defined by Rule 38a-1) by the Trust, the Adviser and the Sub-Adviser. In this regard, the Sub-Adviser shall:

  • Compliance Reporting (i) Provide reports to the Securities and Exchange Commission and the states in which the Portfolios are registered.

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse.

Time is Money Join Law Insider Premium to draft better contracts faster.