Risk Management Framework Sample Clauses

Risk Management Framework. Your company has a Risk Management Framework approved by the Board of Directors. The Risk Management Framework provides the mechanism for risk assessment and its mitigation .The Risk Management framework is being periodically reviewed by the Audit Committee and the Board of Directors.
AutoNDA by SimpleDocs
Risk Management Framework. Based on the Risk Management Framework (RMF) of February 2016, the risks which could impact the proposed programme, include those which are mostly minor or moderate and one of them has been identified as a major risk. Regarding the political aspects, although Albania’s transport sector has been one of its Government’s top priorities, there remains a potential for lacking commitment given that there are other reforms that are considered of a higher priority. Shortfalls in cross-party cooperation and lacking political support for following up with processes for policies and implementation are other risks which are foreseen. Mitigation of these risks could be done by maintaining these issues in a high level dialogue and receiving support from the European Union. Cross-party cooperation and lacking political support can be mitigated with the aid of EU dialogue regarding cross-party work support to the parliament and independent institutions for assistance with oversight and monitoring. While positive growth has been taking place in Albania during the last decades, it still strives for economic renovation and other risks still remain at hand, given the high unemployment and spending and low income. There are risks concerning an increase in public debt weak tax collection, accumulation of new liabilities and arrears. Macroeconomic stability needs to be further anchored beyond the ongoing IMF program; Weak commitment and political support are the main risks for Public Financial Management and developmental issues, but can be reduced through mitigation measures such as close monitoring and continuous dialogue with the government Corruption and Fraud is the most substantial risk due to resistance to prevention and control. In order to mitigate this high risk, corruption cases must be brought to justice while participation of stake holders and law enforcement agencies need to be enhanced. Risk Level Mitigation measures Political Lack of commitment from the Government for undertaking targeted reforms in the area of rule of law, public administration reform, anti-corruption and respect of fundamental rights. Shortfalls in cross-party cooperation on key EU- related reform issues, political cooperation and the effective functioning of independent institutions. Lack of high level political support to monitor and follow up on the policy making and implementation processes. Moderate Continuous policy dialogue in the context of the High Level Dialogue and the EU support for...
Risk Management Framework. The Group’s risk management framework should be based on an appropriate industry accepted standard such as AS/NZS ISO 31000 2009 series (or similar) with such adaptation (as appropriate) having regard to the Group’s particular needs. Policy 22 |Version 2.0 | Issue Date 18/12/2019 Page 2 of 2 APPENDIX B6 TRADING OF COMPANY SECURITIES POLICY POLICY POLICY TRADING OF COMPANY SECURITIES RESPONSIBILITY: COMPANY SECRETARY 1 GENERAL PRINCIPLES The principle behind this policy on trading (buying, selling or other dealing in) Company securities (being shares, options, or any other equity, debt or derivative instruments, including instruments to limit the economic risk of other securities held), is as follows:
Risk Management Framework. 7.01 The MDBA maintains a Risk Management Framework based on the Australian Standard for Risk Management (AS/NZS ISO 31000:2009). Risks are identified at the sub-program level identified in the Corporate Plan and assessed through a consistently applied and replicable methodology and follow a structured approach which encompasses the context, identification, assessment, analysis and treatment of risks.
Risk Management Framework. The National Institute of Standards and Technology (NIST) working with the Department of Defense and other organizations developed a common information security framework for the Federal Government and its contractors. The Risk Management Framework (RMF) replaces the traditional certification and accreditation (C&A) process and includes a continuous monitoring process. The RMF steps2 include:
Risk Management Framework. This SOW’s goal is to design a remedy consistent with the ROD that will reduce key human and ecological risks cost effectively given Site characteristics, which results in a cleanup that is protective of public health and the environment and meets all federal and state applicable and relevant and appropriate requirements (ARARs). The risk lines of evidence used in the ROD will guide risk management for the Gasco Sediments Site. The design will also use a risk management framework consistent with EPA guidance (EPA 2005 and EPA 1988) on developing sediment remedies and specifically recognizes the risk management goals for the project throughout the evaluation and design process. The risk management related approaches that are specifically important to this project and are consistent with guidance include:  The Gasco Sediments Site clean up boundary will be consistent with Portland Harbor EPA approved BLRA.  Evaluate remedial alternatives with regard to total net risk reduction within the overall framework of the NCP remedy selection criteria.  Use the Portland Harbor risk assessment protocols, procedures, data, and outcomes whenever possible to set clean up boundaries and evaluate risk reduction, unless use of these would cause an unacceptable delay to the Gasco Sediments Site remediation.  Evaluate alternatives for long term effectiveness for a range of technologies including dredging, capping, and Monitored Natural Recovery (MNR).2 Alternatives will include combinations of technologies that are tailored to the physical, chemical and other conditions of the Site.  Evaluate the short term risks (i.e., sediment resuspension, water borne releases, and dredge residuals) posed by different dredge methods (i.e., hydraulic and clam shell) and the installation and removal of various containment systems (i.e., sheet pile and xxxxxx dam).  Because the level of some of the risk is related to biota exposures, evaluate migration pathways, bioavailability, and future exposure (e.g., sediment stability under various river current and vessel propeller scour conditions) when predicting risk reduction.  Evaluate future exposures and risks potentially posed by the presence of potentially mobile product in sediment.  Preference for removal of “substantial product” as defined in Section 3.6.2.1 of this SOW from the project area for offsite disposal, where consistent with the other risk management framework approaches. Remedial alternatives analysis will be conducted usi...
Risk Management Framework. This section is not applicable if contract has DHS Sensitive Information Required Special Contract Terms (MARCH 2015), SAFEGUARDING OF SENSITIVE INFORMATION (MAR 2015) D.1. The Security Authorization and Ongoing Authorization Process in accordance with NIST SP 800- 37 and SP 800-137 (current versions) is a requirement for all TSA IT systems, including General Support Systems (e.g., standard TSA desktop, general network infrastructure, electronic mail), major applications and development systems (if connected to the operational network or processing, storing, or transmitting government data). These processes are documented in the NIST Risk Management Framework (RMF). Ongoing Authorization is part of Step 6 “Monitoring” of the RMF. All NIST guidance is publicly available; TSA and DHS security policy is disclosed upon contract award with some exceptions, which are public facing (i.e., DHS Security and Training Requirements for Contractors).
AutoNDA by SimpleDocs
Risk Management Framework. You must mitigate security risks for which you are responsible, including those identified during continuous monitoring activities. All vulnerabilities and findings must be remediated, in accordance with timelines specified in the HHS POA&M Standard, from discovery: (1) critical vulnerabilities no later than seven (7) days and (2) high within fifteen (15) days (3) medium within forty five (45) days and (4) low vulnerabilities no later than ninety (90) days. In the event a vulnerability or other risk finding cannot be mitigated within the prescribed timelines above, they must be added to the designated POA&M and mitigated within the newly designated timelines. You must maintain inventory of your information system assets, refreshed annually, that documents the identification, ownership, usage, location and configuration for each item. Ensure that changes to assets follow a documented change management procedure. You must support Records Management requirements during the period of performance. We recommend that the vendor pattern their record retention and disposition actions in accordance with one of the two Retention Schedules: Enhanced 911 (xxxxxxxx.xxx)

Related to Risk Management Framework

  • Risk Management Except as required by applicable law or regulation, (i) implement or adopt any material change in its interest rate and other risk management policies, procedures or practices; (ii) fail to follow its existing policies or practices with respect to managing its exposure to interest rate and other risk; or (iii) fail to use commercially reasonable means to avoid any material increase in its aggregate exposure to interest rate risk.

  • Framework This Agreement establishes a framework that will enable Red Hat to provide Software and Services to Client. “Software” means Red Hat Enterprise Linux, JBoss Enterprise Middleware and other software programs branded by Red Hat, its Affiliates and/or third parties including all modifications, additions or further enhancements delivered by Red Hat. The specific services (the “Services”) and/or Software that Red Hat will provide to Client will be described in an Order Form, signed by the parties or otherwise accepted by Red Hat, which may consist of (a) one or more mutually agreed order forms, statements of work, work orders or similar transaction documents, or (b) an order placed by Client through Red Hat's online store accessible from a Red Hat website. The parties agree that the terms of this Agreement will govern all purchases and use by Client of Software and Services unless otherwise agreed by the parties in writing.

  • Programme Management The Government will establish a programme management office and the Council will be able to access funding support to participate in the reform process. The Government will provide further guidance on the approach to programme support, central and regional support functions and activities and criteria for determining eligibility for funding support. This guidance will also include the specifics of any information required to progress the reform that may be related to asset quality, asset value, costs, and funding arrangements.

  • Risk Management Instruments Except as would not, individually or in the aggregate, reasonably be expected to have a Company Material Adverse Effect, all derivative instruments, including, swaps, caps, floors and option agreements, whether entered into for the Company’s own account, or for the account of one or more of the Company Subsidiaries or its or their customers, were entered into (i) only in the ordinary course of business, (ii) in accordance with prudent practices and in all material respects with all applicable laws, rules, regulations and regulatory policies and (iii) with counterparties believed to be financially responsible at the time; and each of such instruments constitutes the valid and legally binding obligation of the Company or one of the Company Subsidiaries, enforceable in accordance with its terms, except as may be limited by the Bankruptcy Exceptions. Neither the Company or the Company Subsidiaries, nor, to the knowledge of the Company, any other party thereto, is in breach of any of its obligations under any such agreement or arrangement other than such breaches that would not, individually or in the aggregate, reasonably be expected to have a Company Material Adverse Effect.

  • Financial Framework 1. In accordance with Article 2.1 of Protocol 38c, the total amount of the financial contribution is € 1548.1 million in annual tranches of € 221.16 million over the period running from 1 May 2014 to 30 April 2021, inclusive.

  • Strategy As an organization without operational services (fuel, maintenance, etc.), and in consideration that the majority of potential issues come from boat maintenance whereby the boats are personal property, the predominant strategy will be the minimization of on-site waste. With this approach, the organization will have minimal potential impact on the environment and reduce regulatory risk. To accomplish this, requirements will be established by policy, periodic communications shall occur, and audits will be utilized to provide feedback for improvement.

  • Framework Management Structure 2.1.1 The Supplier shall provide a suitably qualified nominated contact (the “Supplier Framework Manager”) who will take overall responsibility for delivering the Goods and/or Services required within this Framework Agreement, as well as a suitably qualified deputy to act in their absence.

  • PROCUREMENT LOBBYING To the extent this agreement is a "procurement contract" as defined by State Finance Law Sections 139-j and 139-k, by signing this agreement the contractor certifies and affirms that all disclosures made in accordance with State Finance Law Sections 139-j and 139-k are complete, true and accurate. In the event such certification is found to be intentionally false or intentionally incomplete, the State may terminate the agreement by providing written notification to the Contractor in accordance with the terms of the agreement.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

Time is Money Join Law Insider Premium to draft better contracts faster.