IPP and DPP Sample Clauses

IPP and DPP. The Deferred Purchase Price (DPP) is calculated as follows: DPP = Portfolio - IPP where: For the first Calculation Date, the Portfolio is equal to the E.R.C.G. the Initial Purchase Price (IPP) is equal to the Available Amount that could be allocated to the payment of the Minimum Initial Purchase Price (or MinIPP) and the Incremental Initial Purchase Price (or IncrIPP) in accordance with Clause 5 of the Agreement. where The MinIPP is calculated as follows: MinIPP = Portfolio for Funding * (1-MaxDPP rate) where the applied MaxDPP Rate is listed in Schedule 5, Part 2 The IncrIPP is calculated as follows: IncrIPP = ThIPP - MinIPP where: The Theoretical Initial Purchase Price or ThIPP is calculated as follows ThIPP = Portfolio for Funding * (1-R) The Portfolio for Funding is, for each Originator, the Outstanding Nominal Values of all Purchased Receivables during the Calculation Period that also meet the eligibility criteria for calculation of the XXXX in accordance with Schedule 2 For the first Calculation Date, the Portfolio for Funding is equal to the E.R.C.G. of each Originator
AutoNDA by SimpleDocs
IPP and DPP. The Deferred Purchase Price (“DPP”) is calculated as follows: DPP = Portfolio(1) - IPP where: the Initial Purchase Price (“IPP”) with respect to a Portfolio originated during a Calculation Period is equal to Portfolio(1) * (1-R) (1) for the first Calculation Date, the Portfolio is equal to the E.R.C.G. . Schedule 3 to Receivables Purchase Agreement (Mauser) EXECUTION COPY The MinIPP is calculated as follows: MinIPP = Portfolio(1) * (1-MaxDPPrate) MinIPP in CAD = Portfolio in CAD * (1-MaxDPPrate) MinIPP in EUR = Portfolio in Euro * (1-MaxDPPrate) MinIPP in GBP = Portfolio in GBP * (1-MaxDPPrate) MinIPP in USD = Portfolio in USD * (1-MaxDPPrate) where: • The applied MaxDPP rate is listed in Part 2 of Schedule 3 • The IncrIPP is calculated as follows: IncrIPP = ThIPP - MinIPP where: The Theoretical Initial Purchase Price (the ThIPP) is calculated as follows ThIPP = Portfolio(1) * (1-R) (1) for the first Calculation Date, the Portfolio is equal to the E.R.C.G.
IPP and DPP. The DPP is calculated as follows: DPP = Portfolio - IPP where: For the first Calculation Date, the Portfolio is equal to the E.R.C.G. the IPP is equal to the Available Amount that could be allocated to the payment of the Minimum Initial Purchase Price (or MinIPP) and the Incremental Initial Purchase Price (or IncrIPP) in accordance with Clause 5 of the Agreement. where The MinIPP is calculated as follows: MinIPP = Portfolio for Funding * (1-MaxDPP rate) where the applied MaxDPP Rate is listed in Schedule 5, Part 2 The IncrIPP is calculated as follows: IncrIPP = ThIPP - MinIPP where: The Theoretical Initial Purchase Price or ThIPP is calculated as follows ThIPP = Portfolio for Funding * (1-R) The Portfolio for Funding is, for each Originator, the Outstanding Nominal Values of all Purchased Receivables during the Calculation Period that also meet the eligibility criteria for calculation of the XXXX in accordance with Schedule 2 For the first Calculation Date, the Portfolio for Funding is equal to the E.R.C.G. of each Originator

Related to IPP and DPP

  • PORTAL and DTC The Securities shall have been approved by the NASD for trading in the PORTAL Market and shall be eligible for clearance and settlement through DTC.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Restrictions on Use and Disclosure Except as required by Executive's duties hereunder, Executive shall never, directly or indirectly, use, publish, disseminate or otherwise disclose any Confidential Information or Inventions which are the subject of Section 7.1 without the prior written consent of the Board, except as required by law. Nothing in this Section shall prevent disclosure of information which has been completely disclosed in a published patent or other integrated publication of general circulation, nor shall this Section govern the right to use Inventions for which a patent may have been issued.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Privacy and Data Protection The Company and its subsidiaries have operated their business in a manner compliant in all material respects with all United States federal, state, local and non-United States privacy, data security and data protection laws and regulations applicable to the Company’s collection, use, transfer, protection, disposal, disclosure, handling, storage and analysis of personal data. The Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure the integrity and security of the data collected, handled or stored in connection with its business; the Company and its subsidiaries have been and are in compliance in all material respects with internal policies and procedures designed to ensure compliance with the Health Care Laws that govern privacy and data security and take, and have taken reasonably appropriate steps designed to assure compliance in all material respects with such policies and procedures. The Company and its subsidiaries have taken reasonable steps to maintain the confidentiality of its personally identifiable information, protected health information, consumer information and other confidential information of the Company, its subsidiaries and any third parties in its possession (“Sensitive Company Data”). The tangible or digital information technology systems (including computers, screens, servers, workstations, routers, hubs, switches, networks, data communications lines, technical data and hardware), software and telecommunications systems used or held for use by the Company and its subsidiaries (the “Company IT Assets”) are adequate and operational for, in accordance with their documentation and functional specifications, the business of the Company and its subsidiaries as now operated and as currently proposed to be conducted as described in the Registration Statement, the General Disclosure Package and the Prospectus. The Company and its subsidiaries have used reasonable efforts to establish, and have established, commercially reasonable disaster recovery and security plans, procedures and facilities for the business consistent with industry standards and practices in all material respects, including, without limitation, for the Company IT Assets and data held or used by or for the Company and its subsidiaries. The Company and its subsidiaries have not suffered or incurred any security breaches, compromises or incidents with respect to any Company IT Asset or Sensitive Company Data, except where such breaches, compromises or incidents would not, individually or in the aggregate, be material to the Company or any of its subsidiaries; and there has been no unauthorized or illegal use of or access to any Company IT Asset or Sensitive Company Data by any unauthorized third party. The Company and its subsidiaries have not been required to notify any individual of any information security breach, compromise or incident involving Sensitive Company Data.

  • Data Protection The Administrator shall implement and maintain a comprehensive written information security program that contains appropriate security measures to safeguard the personal information of the Trust’s shareholders, employees, directors and/or officers that the Administrator receives, stores, maintains, processes or otherwise accesses in connection with the provision of services hereunder. For these purposes, “personal information” shall mean (i) an individual’s name (first initial and last name or first name and last name), address or telephone number plus (a) social security number, (b) driver’s license number, (c) state identification card number, (d) debit or credit card number, (e) financial account number or (f) personal identification number or password that would permit access to a person’s account or (ii) any combination of the foregoing that would allow a person to log onto or access an individual’s account. Notwithstanding the foregoing “personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.

  • Activity Restrictions For so long as Investor or any of its Affiliates holds any Shares, neither Investor nor any Affiliate will: (1) vote any shares of Common Stock owned or controlled by it, sign or solicit any proxies, attend or be present at a shareholder meeting for purposes of determining a quorum, or seek to advise or influence any Person with respect to any voting securities of Company, except in accordance with the recommendation of Company’s board of directors; (2) engage or participate in any actions, plans or proposals which relate to or would result in (a) acquiring additional securities of Company, alone or together with any other Person, which would result in beneficially owning or controlling more than 9.99% of the total outstanding Common Stock or other voting securities of Company, (b) an extraordinary corporate transaction, such as a merger, reorganization or liquidation, involving Company or any of its Subsidiaries, (c) a sale or transfer of a material amount of assets of Company or any of its Subsidiaries, (d) any change in the present board of directors or management of Company, including any plans or proposals to change the number or term of directors or to fill any existing vacancies on the board, (e) any material change in the present capitalization or dividend policy of Company, (f) any other material change in Company’s business or corporate structure, including but not limited to, if Company is a registered closed-end investment company, any plans or proposals to make any changes in its investment policy for which a vote is required by Section 13 of the Investment Company Act of 1940, (g) changes in Company’s charter, bylaws or instruments corresponding thereto or other actions which may impede the acquisition of control of Company by any Person, (h) a class of securities of Company being delisted from a national securities exchange or to cease to be authorized to be quoted in an inter-dealer quotation system of a registered national securities association, (i) a class of equity securities of Company becoming eligible for termination of registration pursuant to Section 12(g)(4) of the Act, or (j) any action, intention, plan or arrangement similar to any of those enumerated above; or (3) request Company or its directors, officers, employees, agents or representatives to amend or waive any provision of this section.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust has determined that the Procedures, as part of the Trust’s overall anti-money laundering program and the Red Flag Identity Theft Prevention program, are reasonably designed to prevent the Fund from being used for money laundering or the financing of terrorist activities and to achieve compliance with the applicable provisions of the Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust:

  • Publicity and Disclosures No press releases or public disclosure, either written or oral, of the transactions contemplated by this Agreement, shall be made by a party to this Agreement without the prior knowledge and written consent of Buyer and the Company.

Time is Money Join Law Insider Premium to draft better contracts faster.