Requirements for Protection In compliance with NPCC requirements and Good Utility Practice, Developer shall provide, install, own, and maintain relays, circuit breakers and all other devices necessary to remove any fault contribution of the Large Generating Facility to any short circuit occurring on the New York State Transmission System not otherwise isolated by Connecting Transmission Owner’s equipment, such that the removal of the fault contribution shall be coordinated with the protective requirements of the New York State Transmission System. Such protective equipment shall include, without limitation, a disconnecting device or switch with load- interrupting capability located between the Large Generating Facility and the New York State Transmission System at a site selected upon mutual agreement (not to be unreasonably withheld, conditioned or delayed) of the Developer and Connecting Transmission Owner. Developer shall be responsible for protection of the Large Generating Facility and Developer’s other equipment from such conditions as negative sequence currents, over- or under-frequency, sudden load rejection, over- or under-voltage, and generator loss-of-field. Developer shall be solely responsible to disconnect the Large Generating Facility and Developer’s other equipment if conditions on the New York State Transmission System could adversely affect the Large Generating Facility.
TEACHER PROTECTION A. The teachers shall have the right to review those things in his/her personnel file to which he/she is entitled by Law. At the option of the teacher, a representative of the Association may be present for such review. Each file shall contain a record indicating reviewer and date of review, excluding school personnel official access for record maintenance. B. The teacher may submit a written notation regarding any material and the same will be attached to the file copy of the material in question. If the teacher is asked to sign material placed in his/her file, such signature will be understood to indicate his/her awareness of the material but in no instance shall said signature be interpreted to mean agreement with the content of the material. X. Any serious complaint made against a teacher by any parent, student, and other person will be promptly called to the attention of the teacher. D. If a teacher is to be disciplined or reprimanded by the Board or its designee, he/she shall be entitled to have a representative of the Association present. That representative shall be the teacher's choice between the building representative or another Association officer. E. Each teacher has the responsibility for maintaining proper student control and discipline throughout the school day as well as at school-sponsored activities where he/she is serving as a sponsor or chaperone. The teacher, however, has the primary responsibility for maintaining control and discipline in his/her classroom. The Board will give reasonable support and assistance to teachers with respect to maintenance of control and discipline. Whenever is appears that a particular pupil requires special attention, reasonable steps shall be taken to provide such attention. The teachers recognize that all disciplinary actions and methods invoked by them shall be in accordance with established Board policy. F. Any case of assault upon a teacher which is related to a school-centered problem shall be promptly reported to the Board or its designated representative. If the assault was by a pupil or pupils, the Administration shall promptly investigate the matter and determine suitable discipline for the assaulting pupil. This decision shall be communicated to the teacher concerned. If the assault is by an adult, who is not a pupil, the Board its designee representative shall promptly report the incident to the proper law enforcement authorities. G. A teacher may suspend a pupil from one (1) period, when the grossness of the offense, the persistence of the misbehavior, or the disruptive effect of the violation makes the continued presence of the student in that classroom intolerable. In such cases, the teacher will promptly (by the end of the school day) furnish the administrator or counselor full particulars of the incident. The teacher and the administration will cooperatively endeavor to achieve correction of student behavior through whatever avenues are reasonably available. H. School administrators and teachers will endeavor to achieve correction of the students' misbehavior through counseling and interviews with the child and his/her parents when warranted.
Application of Takeover Protections The Company and the Board of Directors have taken all necessary action, if any, in order to render inapplicable any control share acquisition, business combination, poison pill (including any distribution under a rights agreement) or other similar anti-takeover provision under the Company’s certificate of incorporation (or similar charter documents) or the laws of its state of incorporation that is or could become applicable to the Purchasers as a result of the Purchasers and the Company fulfilling their obligations or exercising their rights under the Transaction Documents, including without limitation as a result of the Company’s issuance of the Securities and the Purchasers’ ownership of the Securities.
Further Protection The Pledgor will promptly give notice to the Secured Party of, and defend against, any suit, action, proceeding or lien that involves Posted Credit Support Transferred by the Pledgor or that could adversely affect the security interest and lien granted by it under Paragraph 2, unless that suit, action, proceeding or lien results from the exercise of the Secured Party’s rights under Paragraph 6(c).
System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.
Whistleblower Protections The Party shall not discriminate or retaliate against one of its employees or agents for disclosing information concerning a violation of law, fraud, waste, abuse of authority or acts threatening health or safety, including but not limited to allegations concerning the False Claims Act. Further, the Party shall not require such employees or agents to forego monetary awards as a result of such disclosures, nor should they be required to report misconduct to the Party or its agents prior to reporting to any governmental entity and/or the public.
Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position: (a) At the equivalent salary, grading; (b) At the equivalent weekly hours of duty; (c) In the same location or other location within reasonable commuting distance; and (d) Involving responsibilities broadly comparable to those experienced in the previous position. 15.9.2 Where applicable, employees shall continue to be awarded increments when their incremental date falls during absence on parental leave.
Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.
Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.
Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.