Duplicate Proxy

Duplicate Proxy
A secondary voting proxy that allows a shareholder to override an already submitted vote. When duplicate proxies are received by the corporation, the document with the most timely information will be taken into account.

Issuing a duplicate proxy will retract a shareholder's earlier decision. Most firms will provide shareholders with additional proxy forms, allowing them to change their mind when voting on corporate issues. The secondary proxy should be submitted in a timely manner, or risk missing the voting process.


Investment dictionary. . 2012.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • duplicate proxy — A second proxy received on an account. If the second proxy bears a more recent date than the first proxy, and has a different voting pattern, the second proxy will override the first. Bloomberg Financial Dictionary …   Financial and business terms

  • Proxy pattern — Proxy in UML Proxy in …   Wikipedia

  • List of Ergo Proxy episodes — The following is a list of episodes for the Japanese anime series Ergo Proxy . List of episodesTrivia*Episode 1 begins with a quotation from Michelangelo s reply to Giovan Battista Strozzi s in the Medici Chapel. The opening sequence from Episode …   Wikipedia

  • 6LoWPAN — est l acronyme de IPv6 Low power Wireless Personal Area Networks[note 1] ou IPv6 LoW Power wireless Area Networks[note 2]. C est également le nom d un groupe de travail de l IETF. Le groupe 6LoWPAN a défini les mécanismes d encapsulation et de… …   Wikipédia en Français

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • Autograph — ImageStackRight|275 An autograph is a document written entirely in the handwriting of its author, as opposed to a typeset document or one transcribed by an amanuensis or a copyist; the meaning overlaps with that of the word holograph. Autograph… …   Wikipedia

  • Diameter (protocol) — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Information security audit — An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple type of audits, multiple objectives for different audits, etc. Most… …   Wikipedia

  • Orcus (Dungeons & Dragons) — Orcus Game background Title(s) Prince of the Undead, Prince of Undeath, The Blood Lord Home plane Abyss Power level Demon lord Alignment …   Wikipedia

  • Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”