Client Protection. 3.9.1 In order to provide Clients with protection against the potential adverse consequences of certain events i.e. when the market is highly volatile the Company might take any or all of the following steps, including but not limited to:
Client Protection. Persons receiving training and support under this section may not be denied their rights or procedural protections under section 256.045, subdivision 4a, or 256B.092, including the county agency's responsibility to arrange for appropriate services, as necessary, in the event that persons lose their job or the contract with the qualified business is terminated.
Client Protection. Subject to the rights of the parties under the Industrial Relations Act 1996 as amended, the parties are committed to meeting the needs of the Company’s clients and protecting the interests of their customers. To meet this commitment, it is agreed that in the event of industrial disputation, whether the Company or its employees are direct parties to the issue or not, the Company and its employees will attempt to continue operations to meet contractual obligations to its customers, which currently include Norske Skog, Nestle, PaperlinX, Pirelli and KAAL, subject to any occupational health and safety considerations.
Client Protection. Xxxxx Xxxx Real Estate shall make every effort possible to protect your relationship with your Clients, but it will be the Cooperating Firms sole responsibility to promptly register by letter all Clients they have discussed our exclusive listings with. Any Client that contacts Xxxxx Xxxx Real Estate that is not registered in writing or accompanied by an agent of a Cooperating Firm will be deemed solely Clients of Xxxxx Xxxx Real Estate. Should any conflict arise, i.e., Xxxxx Xxxx Real Estate already working with Clients or Clients previously registered by another Firm, we will advise immediately. SHOWINGS: All showings of properties listed by Xxxxx Xxxx Real Estate shall be performed with a representative of Xxxxx Xxxx Real Estate present. Showings must be scheduled 24 hours prior, so our Sellers and Xxxxx Xxxx Real Estate can properly prepare for showing. Drive‐by showings are not allowed, we expect all Cooperating Firms to have qualified their potential Buyers desires and capabilities, prior to showing. COMMUNICATION: Unless prior agreements are made between Xxxxx Xxxx Real Estate and Cooperating Firms, we will have all direct communications with Sellers and will leave all direct communication with potential Buyers the responsibility of Cooperating Firms. (With the exception of referral Clients only).
Client Protection. (i) Malware and malicious code protection is applied to all applicable workstations. No workstations are permitted to store or process customer data (ii) Host-based firewall/intrusion prevention software that blocks activity not directly related to or useful for business purposes
Client Protection. 28.01 The Union and the Nurses recognize their responsibilities to provide those services essential to the health and well-being of clients in this facility and will sit down and discuss with the Employer prior to any strike or work stoppage the requirement to provide nursing services for the duration of any strike or work stoppage.
Client Protection. Informed consent must be given by clients in order for their information to be shared among participating agencies in the NWSSC CMIS/HMIS. o Note: If the Client does not consent to sharing data, the Client data will still be collected and entered into CMIS/HMIS – just not shared with participating agencies. Identifying Client information will only be shared among agencies that have signed a data sharing agreement. At the time of informed consent, and at any point after, the Client has the right to see a current list of the participating agencies. Additional participating agencies2 may join the NWSSC CMIS/HMIS and will be added to the list of CMIS/HMIS participating agencies. As part of the informed consent process, Clients must be informed that additional agencies may join the collaborative at any time and may have access to their information. CMIS/HMIS Users will maintain CMIS/HMIS data in such a way as to protect against revealing the identity of Clients to unauthorized agencies, individuals, or entities. Clients may not be denied services based on their choice to withhold their consent. Information will not be used to harm or deny any services to a Client. Clients have the right to request information about who has viewed or updated their record. In transmitting, receiving, storing, processing or otherwise dealing with any consumer protected information, CMIS/HMIS Users will comply with all applicable state and federal laws. Participant agrees to notify the NWSSC CMIS/HMIS administrators, within one business day, of any breach, use, or disclosure of the protected information covered by this Agreement. Participant agrees to resist, through judicial proceedings, any judicial or quasi-judicial effort to obtain access to protected information pertaining to consumers within CMIS/HMIS, unless expressly provided for in state and/or federal laws or regulations. Subject to the conditions and limitations of the Oregon Constitution and the Oregon Tort Claims Act, ORS 30.260 through 30.300, Participant Agency shall defend, indemnify, and hold all other parties harmless from any and all claims arising out of Participant’s negligent or intentional acts under this Agreement. Any loss or liability to third parties resulting from negligent acts, errors, or omissions of a NWSSC CMIS/HMIS User while acting within the scope of their authority under this Agreement shall be borne by that Participant Agency exclusively. Participant enters into this Inter-A...
Client Protection. Malware and malicious code protection are applied to all applicable workstations. No workstations are permitted to store or process customer data
Client Protection. 2. 客户端保护。
Client Protection a) An anti-virus program using commercially available software that is updated at least daily on systems that are commonly susceptible to virus and malware attacks;