Assistance to Institution Sample Clauses

Assistance to Institution. Handshake will provide reasonable assistance to Institution regarding: a. Any requests from Institution data subjects in respect of access to or the rectification, erasure, restriction, portability, blocking or deletion of Student Personal Data that Handshake processes for Institution. In the event that a data subject sends such a request directly to Handshake, Handshake will promptly send such request to Institution; b. The investigation of Personal Data Breaches and the notification to the Supervisory Authority and Institution's data subjects regarding such Personal Data Breaches; and c. Where appropriate, the preparation of data protection impact assessments and, where necessary, carrying out consultations with any Supervisory Authority.
AutoNDA by SimpleDocs
Assistance to Institution 

Related to Assistance to Institution

  • Notice of Criminal Activity and Disciplinary Actions a. Xxxxxxx shall immediately report in writing to their contract manager when Xxxxxxx has knowledge or any reason to believe that they or any person with ownership or controlling interest in the organization/business, or their agent, employee, contractor or volunteer that is providing services under this Contract has: 1. Engaged in any activity that could constitute a criminal offense equal to or greater than a Class A misdemeanor or grounds for disciplinary action by a state or federal regulatory authority; or 2. Been placed on community supervision, received deferred adjudication, or been indicted for or convicted of a criminal offense relating to involvement in any financial matter, federal or state program or felony sex crime. b. Grantee shall not permit any person who engaged, or was alleged to have engaged, in any activity subject to reporting under this section to perform direct client services or have direct contact with clients, unless otherwise directed in writing by the System Agency.

  • Routing for Operator Services and Directory Assistance Traffic For a Verizon Telecommunications Service dial tone line purchased by CBB for resale pursuant to the Resale Attachment, upon request by CBB, Verizon will establish an arrangement that will permit CBB to route the CBB Customer’s calls for operator and directory assistance services to a provider of operator and directory assistance services selected by CBB. Verizon will provide this routing arrangement in accordance with, but only to the extent required by, Applicable Law. Verizon will provide this routing arrangement pursuant to an appropriate written request submitted by CBB and a mutually agreed-upon schedule. This routing arrangement will be implemented at CBB's expense, with charges determined on an individual case basis. In addition to charges for initially establishing the routing arrangement, CBB will be responsible for ongoing monthly and/or usage charges for the routing arrangement. CBB shall arrange, at its own expense, the trunking and other facilities required to transport traffic to CBB’s selected provider of operator and directory assistance services.

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

  • Proxies and Notices; Compliance with the Shareholders Communication Act of 1985 The Custodian shall deliver or cause to be delivered to the appropriate Fund all forms of proxies, all notices of meetings, and any other notices or announcements affecting or relating to Securities owned by such Fund that are received by the Custodian, any Subcustodian, or any nominee of either of them, and, upon receipt of Instructions, the Custodian shall execute and deliver, or cause such Subcustodian or nominee to execute and deliver, such proxies or other authorizations as may be required. Except as directed pursuant to Instructions, neither the Custodian nor any Subcustodian or nominee shall vote upon any such Securities, or execute any proxy to vote thereon, or give any consent or take any other action with respect thereto. The Custodian will not release the identity of any Fund to an issuer which requests such information pursuant to the Shareholder Communications Act of 1985 for the specific purpose of direct communications between such issuer and any such Fund unless a particular Fund directs the Custodian otherwise in writing.

  • Interlocal Cooperation Act RCW 39.34 allows cooperative purchasing between public agencies, and other political subdivisions. SMC 20.60.100 also allows non profits to use these agreements. If a public agency files or has filed an Intergovernmental Cooperative Purchasing Agreement with the City of Seattle, those agencies are eligible to purchase from Contracts established by the City. Such agencies may ask City of Seattle Contractors to accept orders from the agency, citing the City of Seattle contract as the basis for the order. The Vendor may accept or decline such orders. If the Vendor accepts an order from another public agency using the City of Seattle contract as the basis, the Vendor agrees to sell additional items at the contract prices, terms and conditions. The City of Seattle accepts no responsibility for the payment of the purchase price by other governmental agencies. Should the Vendor require additional pricing for such purchases, the Vendor is to name such additional pricing upon Offer to the City.

  • Certification of Compliance with the Energy Policy and Conservation Act When appropriate and to the extent consistent with the law, Vendor certifies that it will comply with the Energy Policy and Conservation Act (42 U.S.C. 6321 et seq; 49 C.F.R. Part 18) and any mandatory standards and policies relating to energy efficiency which are contained in applicable state energy conservation plans issued in compliance with the Act. Does Vendor agree? Yes

  • Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Agreement Administration SBBC has delegated authority to the Superintendent of Schools or his/her designee to take any actions necessary to implement and administer this Agreement.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!