LOAN PORTFOLIO MANAGEMENT (1) The Board shall, within ninety (90) days, develop, implement, and thereafter ensure Bank adherence to a written program to improve the Bank's loan portfolio management. The program shall include, but not be limited to:
RESERVATIONS TO MANAGEMENT 3.01 The union recognizes the right of the company to hire, promote, demote, transfer, discipline, suspend or discharge any employee subject to such regulations and restrictions governing the exercise of these rights as are expressly provided in this agreement and subject to the right of the employee concerned to lodge a grievance in the manner and to the extent herein provided. Any change in rules and regulations to be observed by employees shall be negotiated by the parties.
Portfolio The portfolio is due by the end of the 12th week.
Traffic Management 9.2.1 During the Operating Period, Developer shall be responsible for the general management of traffic on the Facility. Developer shall manage traffic so as to preserve and protect safety of traffic on the Facility and Related Transportation Facilities and, to the maximum extent practicable, to avoid disruption, interruption or other adverse effects on traffic flow, throughput or level of service on the Facility and Related Transportation Facilities. Developer shall conduct traffic management in accordance with all applicable Technical Provisions, Technical Documents, Laws and Governmental Approvals, and in accordance with the Traffic Management Plan.
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.
Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.
Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.