Accountability and Procedures Sample Clauses

Accountability and Procedures. If a service request is not completed to the satisfaction of a Supported Library, the Supported Library should contact the WLS IT management team at the information provided in Appendix "B" and request an escalation of an incident/ticket. As needed, a meeting between the Supported Library director and/or an authorized representative and the System Operations Manager will occur to address and resolve the issue(s). Should additional response be needed, the incident will be escalated to a higher level within the System. Supported Library's director will be provided with a monthly report outlining all service request incidents to keep library management aware of service incidents.
AutoNDA by SimpleDocs
Accountability and Procedures. I will protect the VISA card at all times. I will not give the credit card number to anyone except authorized University personnel or over the phone when making an authorized purchase. The VISA card may be physically checked out for local use only. The VISA card must be physically secured at its assigned location each night. All purchases I make will be within the established credit limit. I understand that all charges associated with this card will be paid from my department’s approved budget. Upon completing an authorized purchase I will return the VISA card and all charge slips, merchant receipts, photocopies of mail order and telephone order forms, and packing slips to the Card Custodian.
Accountability and Procedures. The card is issued in the Oregon Tech Department name. I will not allow unauthorized users to use the card. I am considered responsible for any and all charges I make against the card. I will protect the procurement card at all times. All purchases I make will be within the established credit limit. I understand that all charges associated with this card will be paid from my department's approved budget.
Accountability and Procedures. I will protect and control the VISA Purchasing Card at all times. I will retain physical custody of the card and will ensure that it is kept in a secure location. The card custodian will maintain a log for check out and check in of the card by purchasing card users. I will not give the card number to anyone except authorized OSU employees who have signed the Designated User Agreement. I may authorize other designated OSU employees within the department as users of the VISA card. Each employee must read and sign a VISA Purchasing Card User Agreement. User Agreements will be updated by the Department as users change, and copy forwarded to Business Affairs. All Departmental and User Agreements will be updated annually in January and submitted to Business Affairs. I will retain all backup documentation for the VISA Purchasing Card for 6 years and when the VISA Purchasing Card is used with a Grant I will retain the backup documentation for 3 years after the ending date of the Grant.

Related to Accountability and Procedures

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Rules and Procedures The Benefit Society By-Laws will be amended to provide for a 6th Director with three Directors appointed by the Unions and three Directors appointed by the Corporation.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Compliance with Laws, Rules and Regulations a. Assurances. The Contractor agrees that all activity pursuant to this Contract will be in accordance with all applicable current federal, state and local laws, rules, and regulations, including but not limited to the Public Records Act (chapter 42.56 RCW), the Freedom of Information Act (5 U.S.C. 522) and the Records Retention Act (chapter 40.14 RCW).

  • Compliance with Rules and Policies The Executive shall perform all services in accordance with the lawful policies, procedures and rules established by the Company and the Board. In addition, the Executive shall comply with all laws, rules and regulations that are generally applicable to the Company or its subsidiaries and their respective employees, directors and officers.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Compliance with Laws and Rules Applicant shall comply with all statutes, regulations, and ordinances of all local, state and federal jurisdictions concerning the use of the Property. In addition, the City shall have the right to adopt reasonable rules concerning the use of the Property and Applicant shall comply with the rules.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!