Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.
COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.
Certain Policies Prior to the Effective Time, each of Hxxxxx United and its Subsidiaries shall, consistent with U.S. GAAP, the rules and regulations of the SEC and applicable banking laws and regulations, modify or change its loan, OREO, accrual, reserve, tax, litigation and real estate valuation policies and practices (including loan classifications and levels of reserves) so as to be applied on a basis that is consistent with that of TD Banknorth, provided, however, that no such modifications or changes need be made prior to the satisfaction of the conditions set forth in Sections 8.1(a) and 8.1(b); and provided further that in any event, no accrual or reserve made by Hxxxxx United or any of its Subsidiaries pursuant to this Section 7.15 shall constitute or be deemed to be a breach, violation of or failure to satisfy any representation, warranty, covenant, agreement, condition or other provision of this Agreement or otherwise be considered in determining whether any such breach, violation or failure to satisfy shall have occurred. The recording of any such adjustments shall not be deemed to imply any misstatement of previously furnished financial statements or information and shall not be construed as concurrence of Hxxxxx United or its management with any such adjustments.
Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.
Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees. 7.1.2 The Employees will observe and act in accordance with Company policies and procedures that apply to the Employees, as implemented and amended from time to time.
Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.
Certain Procedures MS&Co. is hereby authorized and instructed to calculate Available Cash through the following procedures. MS&Co. shall first calculate Customer’s excess equity in the form of available USD cash balances held on Customer’s behalf by MS&Co. in the Account subject to and in accordance with the provisions of the Futures Agreement (the “Excess Equity”). For the avoidance of doubt, Excess Equity may, at the discretion of MS&Co., be determined after taking into account any rights of set-off, netting and any other application of Customer’s cash balances to its obligations owed to MS&Co. (or, if applicable, its affiliates) to the extent permitted under the Futures Agreement. MS&Co. shall then subtract the Withholding Amount from the Excess Equity. ( The resulting amount is then available for the purchase of U.S. Treasury Securities in connection with MS&Co.’s provision of the Service pursuant to the terms of this Agreement. MS&Co. is hereby authorized and instructed to withhold from inclusion in its computation of Excess Equity a percentage of available cash, as determined by Customer in its discretion (the “Withholding Amount”), for the purpose of (i) satisfying Customer’s obligations in respect of the Futures Account for that day; (ii) satisfying Customer’s margin requirements in respect of the Futures Account for that day and (iii) protecting against the possibility of adverse market moves causing Customer to incur a debit balance in the Futures Account.
Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.
Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.