Security Selection Sample Clauses

Security Selection. NDR begins the security selection process by identifying current market themes that its strategists believe may outperform the broader market over the term of the trust. These themes are picked by NDR macroeconomic and equity strategists from a larger pool of NDR strategists' themes. The themes selected by NDR for this trust are: [NDR to provide themes for this trust under a separate cover.] NDR then employs multiple processes designed to select specific securities that it believes will benefit more than other securities if one or more of the investment themes play out as predicted. NDR's primary method of identifying the relevant securities to represent the theme(s) is by using the industry classification of the individual securities. Since most stocks can be classified by the industry in which they operate, NDR aligns the theme with the relevant industry(s). This selection is made by both qualitative (categorization) and quantitative (correlations of securities with industry(s)) criteria. The sectors/industries that NDR believes may benefit from the investment themes are: [NDR to provide sectors for this trust under a separate cover.] Once the favored industries have been identified, NDR reduces the broader universe down to the final recommended 40 securities using the criteria below. NDR analysts utilize fundamental, technical, and/or macroeconomic factors to rank the filtered securities. o Fundamental factors pertain to the economics of the specific business and are typically drawn from the financial statements (i.e., income statement, balance sheet, etc.). Some common factors are, but are not limited to, earnings growth, dividend payout ratio and debt/equity ratio. o Technical factors pertain to the trading of the security in the capital markets. Technical factors are used to evaluate the supply and demand for the security. Some common factors are, but are not limited to, price momentum, mean reversion or level of volume of shares traded.
AutoNDA by SimpleDocs
Security Selection. NDR begins the security selection process by identifying current market themes that its strategists believe may outperform the broader market over the term of the trust. These themes are picked by NDR macroeconomic and equity strategists from a larger pool of NDR strategists' themes. NDR then employs multiple processes designed to select specific securities that it believes will benefit more than other securities if one or more of the investment themes play out as predicted. NDR's primary method of identifying the relevant securities to represent the theme(s) is by using the industry classification of the individual securities. Since most stocks can be classified by the industry in which they operate, NDR aligns the theme with the relevant industry(s). This selection is made by both qualitative (categorization) and quantitative (correlations of securities with industry(s)) criteria. The sectors/industries that NDR believes may benefit from the investment themes are: o Financials sector, which may experience improved interest margins and an expanded demand for loans in a rising interest rate environment. o Industrials and materials sectors, which may benefit from the proposed federal government policies of increasing spending on infrastructure, deregulation and tax incentives. o Consumer discretionary sector, which may benefit from increased spending by millennials. o Energy sector, which may be well positioned to benefit from global growth and a bull market in oil. Once the favored industries have been identified, NDR reduces the broader universe down to the final recommended 40 securities using the criteria below. NDR analysts utilize fundamental, technical, and/or macroeconomic factors to rank the filtered securities. o Fundamental factors pertain to the economics of the specific business and are typically drawn from the financial statements (i.e., income statement, balance sheet, etc.). Some common factors are, but are not limited to, earnings growth, dividend payout ratio and debt/equity ratio. o Technical factors pertain to the trading of the security in the capital markets. Technical factors are used to evaluate the supply and demand for the security. Some common factors are, but are not limited to, price momentum, mean reversion or level of volume of shares traded.
Security Selection. Every potential company is evaluated using a quality assessment supported by a team- based approach and peer review process. The quality assessment covers each of the following five key factors: 1) the durability of the business model, 2) the attractiveness of the industry, 3) the strength of financials, 4) the capability of management, and 5) the most financially material environmental, social and governance (“ESG”) factors impacting a company. Examples of ESG factors considered include, but are not limited to, carbon emissions, climate risks, labor management, employee safety and corporate governance. The specific factors considered may vary depending on the type of company being evaluated. When selecting portfolio securities to suggest to the sponsor, abrdn seeks to understand what is changing in companies, industries and markets but is not being priced into the market or is being mispriced. Through fundamental research, supported by a global research presence and proprietary tools, abrdn seeks to identify companies whose quality is not yet fully recognized by the market.
Security Selection abrdn uses a fundamental, bottom-up equity investment process, which is based on first-hand research and disciplined company evaluation. Securities are identified for their long-term, fundamental value. The stock selection process contains two filters, first quality and then price. The quality filter determines whether the company has good growth prospects and a balance sheet that supports expansion. Additionally, long-term value is evaluated by examining a spectrum of considerations such as governance and risk management, including those risks often referred to as environmental, social and governance (“ESG”) factors. ESG analysis is fully integrated into investment decisions for all equity holdings. As such, although ESG investing is not a principal strategy of the trust, ESG factors are considered and evaluated as part of the investment analysis process and this analysis forms an integral component of the quality rating for all companies. In the price filter, the value of a company is assessed by reference to financial ratios. Based upon the financial ratios, an estimate of the value of the company relative to its market price and the valuations of other potential investments is calculated.

Related to Security Selection

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Uniform Commercial Code Security Agreement This Deed of Trust is intended to be a security agreement pursuant to the Uniform Commercial Code, as in effect in the State of Washington, as amended or recodified from time to time (the “Uniform Commercial Code”) for any of the items specified above as part of the Collateral which, under applicable law, may be subject to a security interest pursuant to the Uniform Commercial Code, and Trustor hereby grants Beneficiary a security interest in said items. Trustor agrees that Beneficiary may file this Deed of Trust, or a reproduction thereof, in the real estate records or other appropriate index, as a financing statement for any of the items specified above as part of the Collateral. Any reproduction of this Deed of Trust or of any other security agreement or financing statement shall be sufficient as a financing statement. In addition, Trustor agrees to execute and deliver to Beneficiary, upon Beneficiary’s request, any financing statements, as well as extensions, renewals and amendments thereof, and reproductions of this Deed of Trust in such form as Beneficiary may reasonably require to perfect a security interest with respect to said items. Trustor shall pay all costs of filing such financing statements and any extensions, renewals, amendments and releases thereof, and shall pay all reasonable costs and expenses of any record searches for financing statements Beneficiary may reasonably require. Without the prior written consent of Beneficiary, except as expressly provided in the Credit Agreement, Trustor shall not create or suffer to be created pursuant to the Uniform Commercial Code any other security interest in said items, including replacements and additions thereto. Upon a Default, Beneficiary shall have the remedies of a secured party under the Uniform Commercial Code and, at Beneficiary’s option, may also invoke the remedies provided herein or in any of and subject to the terms of the Loan Documents, or pursuant to any applicable law as to such items. In exercising any of said remedies, Beneficiary may proceed against the items of real property and any items of personal property specified above as part of the Collateral separately or together and in any order whatsoever, without in any way affecting the availability of Beneficiary’s remedies under the Uniform Commercial Code or of the remedies provided herein or in any of the Loan Documents. This Deed of Trust constitutes a fixture filing in accordance with the Washington Uniform Commercial Code (RCW 62A.9A-102(40)) as to all or any part of the Collateral which now or hereafter constitutes "Fixtures" under RCW 62A.9A-102(41).

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • Facility Security Contractor shall keep all doors locked while working in any buildings on the site. Keys shall not be left in the doors. Contractor shall not admit any person into the building that is not a direct employee of the Contractor and not actively engaged in performance of the Work. Contractor shall restrict access to the areas of the facility not specifically included in this Contract for construction services. The Contractor shall check all windows and doors for proper closure and locking, extinguish all lights except master security lighting, and then reactivate the security system (if applicable) prior to leaving the facility.

  • Security Standards The Provider shall implement and maintain commercially reasonable security procedures and practices that otherwise meet or exceed industry standards designed to protect Student Data from unauthorized access, destruction, use, modification, or disclosure, including but not limited to the unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of the Student Data (a "Security Breach"). For purposes of the DPA and this Exhibit G, "Security Breach" does not include the good faith acquisition of Student Data by an employee or agent of the Provider or LEA for a legitimate educational or administrative purpose of the Provider or LEA, so long as the Student Data is used solely for purposes permitted by SOPPA and other applicable law, and so long as the Student Data is restricted from further unauthorized disclosure.

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following:

Time is Money Join Law Insider Premium to draft better contracts faster.