CAL-OSHA Sample Clauses

CAL-OSHA. The requirements for safe working conditions are established and maintained under the California Occupational Safety and Health Act of 1973 (CAL OSHA). Enforcement and rule-making authority is lodged with the Department of Industrial Relations. The Division of Industrial Safety has jurisdiction for inspection and the enforcement of standards; therefore, any disputes arising relating to CAL OSHA requirements are exempted from the grievance process.
AutoNDA by SimpleDocs
CAL-OSHA. If the Superintendent and employee cannot mutually agree upon the existence of an unsafe condition, determination shall be made by CAL-OSHA or other appropriate agency.
CAL-OSHA. All vehicles must meet California Motor Vehicle and Cal-OSHA regulations and all other applicable codes required for vehicle use on the roads or highways in the state of California.
CAL-OSHA. If the procedures for handling a reported hazardous condition are not initiated, or if initiated, fail to effect a satisfactory solution of the problem within a reasonable time, the employee or his/her representative may call the City Occupational Safety Office or Departmental Safety Engineer and report such hazard. Unresolved complaints hereunder may be referred to the State Safety Engineer for processing under CAL/OSHA's rules and regulations.
CAL-OSHA. Without limiting the operations Indemnity in subsection A1, employer sanctions and any other Liabilities that may be assessed against FRANCHISEE or COUNTY or both in connection with any alleged act or omission of FRANCHISEE or any of Franchisee’s Related Parties that is in violation of any Cal/OSHA regulation. This obligation includes all investigations and proceedings associated with purported violations of 8 CCR 336.10 pertaining to multi-employer work sites. FRANCHISEE shall not be obligated to so release, indemnify, defend, and hold harmless COUNTY from and against any Liabilities arising from the active negligence of COUNTY.
CAL-OSHA. The Contractor’s attention is directed to the California Code of Regulations, Title 8, Division 1, Chapter 3.2, Subchapter 2, Article 2 “Permits -- Excavations, Trenches, Construction and Demolition and the Underground Use of Diesel Engines in Work in Mines and Tunnels.” Contractor shall secure a CAL/OSHA Annual or Project Permit,
AutoNDA by SimpleDocs
CAL-OSHA. Agency Temporary Staff shall adhere to all CAL-OSHA regulations where and when applicable to their work environment.

Related to CAL-OSHA

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • Statewide HUB Program Statewide Procurement Division Note: In order for State agencies and institutions of higher education (universities) to be credited for utilizing this business as a HUB, they must award payment under the Certificate/VID Number identified above. Agencies, universities and prime contractors are encouraged to verify the company’s HUB certification prior to issuing a notice of award by accessing the Internet (xxxxx://xxxxx.xxx.xxxxx.xx.xx/tpasscmblsearch/index.jsp) or by contacting

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.

  • Joint Funded Project with the Ohio Department of Transportation In the event that the Recipient does not have contracting authority over project engineering, construction, or right-of-way, the Recipient and the OPWC hereby assign certain responsibilities to the Ohio Department of Transportation, an authorized representative of the State of Ohio. Notwithstanding Sections 4, 6(a), 6(b), 6(c), and 7 of the Project Agreement, Recipient hereby acknowledges that upon notification by the Ohio Department of Transportation, all payments for eligible project costs will be disbursed by the Grantor directly to the Ohio Department of Transportation. A Memorandum of Funds issued by the Ohio Department of Transportation shall be used to certify the estimated project costs. Upon receipt of a Memorandum of Funds from the Ohio Department of Transportation, the OPWC shall transfer funds directly to the Ohio Department of Transportation via an Intra- State Transfer Voucher. The amount or amounts transferred shall be determined by applying the Participation Percentages defined in Appendix D to those eligible project costs within the Memorandum of Funds. In the event that the Project Scope is for right-of-way only, notwithstanding Appendix D, the OPWC shall pay for 100% of the right-of-way costs not to exceed the total financial assistance provided in Appendix C.

  • Staff Development Leave (a) An employee will be granted leave without loss of pay, at their basic rate of pay, to take courses (including related examinations) or attend conferences, conventions, seminars, workshops, symposiums or similar out-of-service programs, at the request of the Employer. The amount of pay received by an employee will not exceed the full-time daily hours of work as outlined in Clause 14.2 (Hours of Work). When such leave is granted, the Employer will bear the full cost, including tuition fees, entrance or registration fees, laboratory fees, and course-related books. The Employer will also reimburse the employee for approved travelling, subsistence, and other legitimate, applicable expenses. (b) An employee may be granted leave without pay, with pay, or leave with partial pay, to take work related courses in which the employee wishes to enrol to acquire the skills necessary to enhance opportunities. (c) Approval of requests will be given reasonable consideration and leaves pursuant to this article will be administered in a reasonable manner. (d) Should the employee noted above terminate their employment for any reason during the six month period following completion of the above-noted leave, the employee will reimburse the Employer for all expenses incurred by the Employer (i.e. tuition fees, entrance or registration fees, laboratory fees, and course-required books) on a proportionate basis.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

  • Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Accommodations of Spiritual or Cultural Observances Where an employee observes a cultural/spiritual day other than those listed above, the employee shall submit their request in January of each year for the twelve (12) month period following March 1st, identifying the required date they need off.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!