Upon detecting Sample Clauses

Upon detecting. 6.4.5.1. The usage of a swap-free account for performing arbitrage orders;
AutoNDA by SimpleDocs
Upon detecting. 6.4.3.1. The usage of an Islamic account (Swap Free) for performing arbitrage orders;
Upon detecting the usage of an Islamic account (Swap Free) for performing arbitrage orders; and/or • the use of the carry trade-related strategies; and/or • an inappropriate usage or purposeful usage of an Islamic account (Swap Free) to make additional profits, the Company reserves the right to revoke the Swap Free status granted to any real trading Account at any time without being obliged to provide any explanation or justification. Furthermore, in the event that we detect any form of abuse, fraud, manipulation, or other forms of deceitful or fraudulent activity in regard to any Swap Free Account, including those referred to in clause 6.4.2 of any client, we reserve the right, at any time and with immediate effect, to:

Related to Upon detecting

  • Safeguarding 2.10. The Local Authority has overarching responsibility for safeguarding and promoting the welfare of all children and young people in their area. They have a number of statutory functions under the 1989 and 2004 Children Acts which make this clear, and the ‘Working Together to Safeguard Children’ 2015 guidance1 sets these out in detail.

  • Agreed Upon Procedures Cooperate with Servicer and the designated accountants or consultants for each annual agreed upon procedures report required pursuant to Sections 8.02(f) and 8.05(g) of the Loan and Security Agreement.

  • Appropriate Safeguards BA shall implement appropriate safeguards to prevent the use or disclosure of Protected Information other than as permitted by the Contract or Addendum, including, but not limited to, administrative, physical and technical safeguards in accordance with the Security Rule, including, but not limited to, 45 C.F.R. Sections 164.308, 164.310, and 164.312. [45 C.F.R. Section 164.504(e)(2)(ii)(B); 45 C.F.R. Section 164.308(b)]. BA shall comply with the policies and procedures and documentation requirements of the Security rule, including, but not limited to, 45 C.F.R. Section 164.316 [42 U.S.C. Section 17931].

  • Limitations on Reverse Engineering, Decompilation, and Disassembly You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.

  • Cooperation of the Parties Each Party agrees to cooperate fully in the preparation, filing, and prosecution of any Patent Rights under this Agreement. Such cooperation includes, but is not limited to:

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Making the Standard of Conduct Determination The Company shall use its reasonable best efforts to cause any Standard of Conduct Determination required under Section 8(b) to be made as promptly as practicable. If the person or persons designated to make the Standard of Conduct Determination under Section 8(b) shall not have made a determination within thirty days after the later of (A) receipt by the Company of a written request from Indemnitee for indemnification pursuant to Section 7 (the date of such receipt being the “Notification Date”) and (B) the selection of an Independent Counsel, if such determination is to be made by Independent Counsel, then Indemnitee shall be deemed to have satisfied the applicable standard of conduct; provided that such 30-day period may be extended for a reasonable time, if the person or persons making such determination in good faith requires such additional time to obtain or evaluate information relating thereto. Notwithstanding anything in this Agreement to the contrary, no determination as to entitlement of Indemnitee to indemnification under this Agreement shall be required to be made prior to the final disposition of any Claim.

Time is Money Join Law Insider Premium to draft better contracts faster.