TRADING IN SECURITY FUTURES PROD- UCTS Sample Clauses

TRADING IN SECURITY FUTURES PROD- UCTS. (A) It shall be unlawful for any person to execute or trade a security futures product until the later of— "(i) one year after the date of enactment of the Commodity Futures Modernization Act of 2000;
AutoNDA by SimpleDocs

Related to TRADING IN SECURITY FUTURES PROD- UCTS

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Procurement from UN Agencies Goods estimated to cost less than $50,000 equivalent per contract may be procured directly from Inter-Agency Procurement Services Agency in accordance with the provisions of paragraphs 3.1 and 3.9 of the Procurement Guidelines.

  • ’s Discount and Electronic Access The Author, or each co-author, is entitled to purchase for their personal use the Work and other books published by the Publisher at a discount of 40% off the list price, for as long as there is a contractual arrangement between the Author and the Publisher and subject to any applicable book price law or regulation. The copies must be ordered from the affiliated entity of the Publisher (Springer Nature Customer Service Center GmbH or Springer Nature Customer Service Center LLC, respectively). Resale of such copies is not permitted. The Publisher shall provide the electronic final published version of the Work to the Author, provided that the Author has included their e-mail address in the manuscript of the Contribution.

  • Review Procedures for Identifying Entity Accounts With Respect to Which Reporting Is Required For Preexisting Entity Accounts described in paragraph B of this section, the Reporting Finnish Financial Institution must apply the following review procedures to determine whether the account is held by one or more Specified U.S. Persons, by Passive NFFEs with one or more Controlling Persons who are U.S. citizens or residents, or by Nonparticipating Financial Institutions:

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Entity Accounts With Respect to Which Reporting Is Required With respect to Preexisting Entity Accounts described in paragraph B of this section, only accounts that are held by one or more Entities that are Specified U.S. Persons, or by Passive NFFEs with one or more Controlling Persons who are U.S. citizens or residents, shall be treated as U.S. Accounts. In addition, accounts held by Nonparticipating Financial Institutions shall be treated as accounts for which aggregate payments are required to be reported under an FFI Agreement.

  • Unbundled Loop Concentration (ULC) System 2.5.1 BellSouth will provide to <<customer_name>> Unbundled Loop Concentration (ULC). Loop concentration systems in the central office concentrate the signals transmitted over local loops onto a digital loop carrier system. The concentration device is placed inside a BellSouth central office. BellSouth will offer ULC with a TR008 interface or a TR303 interface.

  • Security Controls for State Agency Data In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.138, Contractor understands, acknowledges, and agrees that if, pursuant to this Contract, Contractor is or will be authorized to access, transmit, use, or store data for System Agency, Contractor is required to meet the security controls the System Agency determines are proportionate with System Agency’s risk under the Contract based on the sensitivity of System Agency’s data and that Contractor must periodically provide to System Agency evidence that Contractor meets the security controls required under the Contract.

  • Public Entity Crimes A person or affiliate who has been placed on the convicted vendor list following a conviction of a public entity crime may not be awarded or perform work as a contractor, supplier, subcontractor, or consultant under a contract with any public entity in excess of the threshold amount provided in Florida Statutes, Section 287.017 for Category Two for a period of thirty-six (36) months from the date of being placed on the convicted vendor list.

Time is Money Join Law Insider Premium to draft better contracts faster.