Competencies (Skills and Behavioural Attributes) - Please note Sample Clauses

Competencies (Skills and Behavioural Attributes) - Please note. The norm in the industry is to not have more than 7 Skills and Behavioural Attributes per job profile.
AutoNDA by SimpleDocs

Related to Competencies (Skills and Behavioural Attributes) - Please note

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 0-000-000-0000 or submit Form 14039. For more information, see Pub. 5027, Identity Theft Information for Taxpayers. Victims of identity theft who are experiencing economic harm or a systemic problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 0-000-000-0000 or TTY/TDD 0-000-000-0000. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 0-000-000-0000. You can forward suspicious emails to the Federal Trade Commission at xxxx@xxx.xxx or report them at xxx.xxx.xxx/xxxxxxxxx. You can contact the FTC at xxx.xxx.xxx/xxxxxxx or 877-IDTHEFT (877-438-4338). If you have been the victim of identity theft, see xxx.XxxxxxxxXxxxx.xxx and Pub. 5027. Visit xxx.xxx.xxx/XxxxxxxxXxxxx to learn more about identity theft and how to reduce your risk.

  • Enterprise Information Management Standards Performing Agency shall conform to HHS standards for data management as described by the policies of the HHS Chief Data and Analytics Officer. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity and identity theft by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust and USBFS have each determined that the Procedures, as part of the Trust’s overall Anti-Money Laundering Program and Red Flag Identity Theft Prevention Program, are reasonably designed to: (i) prevent each Fund from being used for money laundering or the financing of terrorist activities; (ii) prevent identity theft; and (iii) achieve compliance with the applicable provisions of the Bank Secrecy Act, Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust: (a) Prompt written notification of any transaction or combination of transactions that USBFS believes, based on the Procedures, evidence money laundering or identity theft activities in connection with the Trust or any Fund shareholder; (b) Prompt written notification of any customer(s) that USBFS reasonably believes, based upon the Procedures, to be engaged in money laundering or identity theft activities, provided that the Trust agrees not to communicate this information to the customer; (c) Any reports received by USBFS from any government agency or applicable industry self-regulatory organization pertaining to USBFS’ Anti-Money Laundering Program or the Red Flag Identity Theft Prevention Program on behalf of the Trust; (d) Prompt written notification of any action taken in response to anti-money laundering violations or identity theft activity as described in (a), (b) or (c) immediately above; and (e) Certified annual and quarterly reports of its monitoring and customer identification activities pursuant to the Procedures on behalf of the Trust. The Trust hereby directs, and USBFS acknowledges, that USBFS shall (i) permit federal regulators access to such information and records maintained by USBFS and relating to USBFS’ implementation of the Procedures, on behalf of the Trust, as they may request, and (ii) permit such federal regulators to inspect USBFS’ implementation of the Procedures on behalf of the Trust.

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • Anti-Money Laundering and Identity Theft Prevention Related Duties Subject to the terms and conditions set forth herein, the Trust hereby delegates to the Transfer Agent the Delegated Anti-Money Laundering Duties and, where applicable, the Delegated Identity Theft Prevention Duties that are set forth in the Trust’s Anti-Money Laundering (“AML”) Program and Identity Theft Prevention Program (“IDTPP”) as described below. The Transfer Agent agrees to perform the Delegated Anti-Money Laundering Duties and the Delegated Identity Theft Prevention Duties, with respect to ownership of shares in the Fund for which the Transfer Agent maintains the applicable information subject to and in accordance with the terms and conditions of the Contract.

  • Conhecimento da Lingua O Contratado, pelo presente instrumento, declara expressamente que tem pleno conhecimento da língua inglesa e que leu, compreendeu e livremente aceitou e concordou com os termos e condições estabelecidas no Plano e no Acordo de Atribuição (“Agreement” xx xxxxxx).

  • Background Screening and Security ‌ All Contractor employees and agents performing work under the Contract must comply with all security and other requirements of the Department.

  • Indigenous Peoples The Borrower shall ensure that the Project does not have any indigenous peoples impacts within the meaning of Safeguard Policy Statement. In the event that the Project does have any such impact, the Borrower shall take all steps required to ensure that the Project complies with the applicable laws and regulations of the Borrower, the Safeguard Policy Statement and any corrective or preventative actions set forth in the Safeguards Monitoring Report.

  • AT&T-12STATE acknowledges that CLEC may have an embedded base of one-way trunks ordered and installed prior to the Effective Date of this Agreement that were used for termination of CLEC’s Section 251(b)(5)/IntraLATA Toll Traffic to AT&T-12STATE (Embedded Base). To the extent that CLEC has such an Embedded Base, CLEC shall only augment trunk groups in the Embedded Base with the mutual agreement of the Parties. CLEC shall not order any new one-way trunk groups following the Effective Date of this Agreement. Moreover, the Parties agree that the Embedded Base will be converted to two-way trunk groups under the following circumstances: 4.2.1.1 With reasonable notification from AT&T-12STATE and upon AT&T-12STATE’s request, CLEC shall convert all of its Embedded Base to two-way trunks. 4.2.1.2 At any time an Embedded Base trunk group (either originating or terminating) requires augmentation, AT&T-12STATE can require the associated originating and terminating trunks to be converted to a single two-way trunk group prior to the augmentation. 4.2.1.3 When any network changes are to be performed on a project basis (i.e., central office conversions, tandem re-homes, etc.), upon request and reasonable notice by AT&T-12STATE, CLEC will convert all of its Embedded Base affected by the project within the intervals and due dates required by the project parameters. 4.2.1.4 In addition to the foregoing, CLEC may choose, at any time, to convert its Embedded Base to two-way trunk groups. 4.2.1.5 The Parties will coordinate any trunk group migration, trunk group prioritization and implementation schedule. AT&T-12STATE agrees to develop a cutover plan within thirty (30) days of notification to CLEC of the need to convert pursuant to Section 4.2.1.1 above and Section 4.2.1.3 above.

  • Family Educational Rights and Privacy Act The Charter School is subject to all provisions of the Federal Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g. In the event the Charter School closes, it shall transmit all official student records in the manner prescribed by the State Board.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!