The securitisation narrative Sample Clauses

The securitisation narrative. In February 2004, the World Bank seemed to have changed its position on the Disi project. If approved, the feasibility study would receive partial funding as a guarantee to the private sector59. The hypotheses about the origin of this change of policy are very difficult to formulate: A U.S reward after the Iraqi war? A Saudi move in favour of Jordanian exploitation of the aquifer in exchange for silence over its own exploitation? These explanations are unproven and so far unproposable.
AutoNDA by SimpleDocs

Related to The securitisation narrative

  • Position Description The employee shall be responsible for drafting his/her position description form and shall forward it to his/her supervisor for approval. When the employee and the supervisor disagree on the job description, they shall meet promptly and attempt to reach an agreement on the employee’s job duties. In the event that an agreement cannot be reached, the supervisor will finalize the job description in accordance with the supervisor’s understanding and expectations of the position. The employee may submit his or her comments for the classification analyst to consider when reviewing the position description.

  • Bona Fide Request/New Business Request Process for Further Unbundling 6.1 BellSouth shall, upon request of <<customer_name>>, provide to <<customer_name>> access to its network elements at any technically feasible point for the provision of <<customer_name>>'s telecommunications service where such access is necessary and failure to provide access would impair the ability of <<customer_name>> to provide services that it seeks to offer. Any request by <<customer_name>> for access to a network element, interconnection option, or for the provisioning of any service or product that is not already available shall be treated as a Bona Fide Request/New Business Request (BFR/NBR), and shall be submitted to BellSouth pursuant to the BFR/NBR process.

  • CENTRAL GRIEVANCE PROCESS The following process pertains exclusively to grievances on central matters that have been referred to the central process. In accordance with the School Boards Collective Bargaining Act central matters may also be grieved locally, in which case local grievance processes will apply.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • CFR PART 200 Contract Provisions Explanation Required Federal contract provisions of Federal Regulations for Contracts for contracts with ESC Region 8 and TIPS Members: The following provisions are required to be in place and agreed if the procurement is funded in any part with federal funds. The ESC Region 8 and TIPS Members are the subgrantee or Subrecipient by definition. Most of the provisions are located in 2 CFR PART 200 - Appendix II to Part 200—Contract Provisions for Non-Federal Entity Contracts Under Federal Awards at 2 CFR PART 200. Others are included within 2 CFR part 200 et al. In addition to other provisions required by the Federal agency or non-Federal entity, all contracts made by the non- Federal entity under the Federal award must contain provisions covering the following, as applicable. 2 CFR PART 200 Contracts Contracts for more than the simplified acquisition threshold currently set at $250,000, which is the inflation adjusted amount determined by the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council (Councils) as authorized by 41 U.S.C. 1908, must address administrative, contractual, or legal remedies in instances where contractors violate or breach contract terms, and provide for such sanctions and penalties as appropriate. Notice: Pursuant to the above, when federal funds are expended by ESC Region 8 and TIPS Members, ESC Region 8 and TIPS Members reserves all rights and privileges under the applicable laws and regulations with respect to this procurement in the event of breach of contract by either party. Does vendor agree? Yes

  • CFR PART 200 Contract Provisions Explanation Required Federal contract provisions of Federal Regulations for Contracts for contracts with ESC Region 8 and TIPS Members: The following provisions are required to be in place and agreed if the procurement is funded in any part with federal funds. The ESC Region 8 and TIPS Members are the subgrantee or Subrecipient by definition. Most of the provisions are located in 2 CFR PART 200 - Appendix II to Part 200—Contract Provisions for Non-Federal Entity Contracts Under Federal Awards at 2 CFR PART 200. Others are included within 2 CFR part 200 et al. In addition to other provisions required by the Federal agency or non-Federal entity, all contracts made by the non- Federal entity under the Federal award must contain provisions covering the following, as applicable.

  • Authorization Required Prior to Parallel Operation 2.2.1 The NYISO, in consultation with the Connecting Transmission Owner, shall use Reasonable Efforts to list applicable parallel Operating Requirements in Attachment 5 of this Agreement. Additionally, the NYISO, in consultation with the Connecting Transmission Owner, shall notify the Interconnection Customer of any changes to these requirements as soon as they are known. The NYISO and Connecting Transmission Owner shall make Reasonable Efforts to cooperate with the Interconnection Customer in meeting requirements necessary for the Interconnection Customer to commence parallel operations by the in-service date.

  • Scope of Contract This Contract specifies the contractual terms and conditions by which County will procure and receive goods/services from Contractor as set forth in the Scope of Work, which is attached hereto as Attachment A and incorporated by this reference.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Topic Description Licensee Responsibilities Licensee must:  Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy.  Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3.  Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx.  Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information.  These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature.  Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request.  Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them.  Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials.  Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends  Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce.  Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach  Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and  Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.

Time is Money Join Law Insider Premium to draft better contracts faster.