We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Contents of Personnel File A. Adverse statements prepared by the County shall not be included in an employee's official personnel file unless a copy is provided to the employee. B. An employee shall have the right to inspect and review the contents of his or her official personnel file at reasonable intervals. C. In addition, an employee shall have the right to inspect and review the contents of his or her official personnel file in any case where the employee has a grievance related to performance; to a performance evaluation; or is contesting his or her suspension or discharge from County service. D. Letters of reference and reports concerning criminal investigations concerning the employee shall be excluded from the provisions of B. and C., above. E. An employee shall have the right to respond in writing or personal interview to any information contained in his or her official personnel file, such reply to become a permanent part of such employee's official personnel file. F. Any contents of an employee's official personnel file may be destroyed pursuant to an agreement between the Chief of Employee Relations and the employee concerned or by an order of an arbitrator, court or impartial hearing officer unless the particular item is otherwise required by law to be kept.
Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.
Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.
Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.
Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.
Benefits of Agreement; No Third-Party Rights The provisions of this Agreement are intended solely to benefit the Member and, to the fullest extent permitted by applicable law, shall not be construed as conferring any benefit upon any creditor of the Company (and no such creditor shall be a third-party beneficiary of this Agreement), and the Member shall have no duty or obligation to any creditor of the Company to make any contributions or payments to the Company.
Data Protection Impact Assessment and Prior Consultation Processor shall provide reasonable assistance to the Company with any data protection impact assessments, and prior consultations with Supervising Authorities or other competent data privacy authorities, which Company reasonably considers to be required by article 35 or 36 of the GDPR or equivalent provisions of any other Data Protection Law, in each case solely in relation to Processing of Company Personal Data by, and taking into account the nature of the Processing and information available to, the Contracted Processors.
Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/. B. Grantee shall identify and document on the client records the primary language/dialect of a client who has limited English proficiency and the need for translation or interpretation services and shall not require a client to provide or pay for the services of a translator or interpreter. C. Grantee shall make every effort to avoid use of any persons under the age of 18 or any family member or friend of the client as an interpreter for essential communications with a client with limited English proficiency, unless the client has requested that person and using the person would not compromise the effectiveness of services or violate the client’s confidentiality and the client is advised that a free interpreter is available.
USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code. (b) Any Service Instructions identified by the Account Holder’s TBS Access Code shall be deemed to be given by the Account Holder and shall be conclusive and binding on the Account Holder and the Account Holder hereby authorises the Bank to act on any such Service Instructions identified by the Account Holder’s TBS Access Code. (c) All acts on the part of the Bank pursuant to such Service Instructions identified by the Account Holder’s TBS Access Code shall be conclusive and binding on the Account Holder (notwithstanding that such Service Instructions may not have been given by the Account Holder or with his consent or authority). (d) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled (but not obliged), in its reasonable discretion, to permit the Account Holder to operate the TBS without the use of his T-PIN upon verifying the identity of the Account Holder in accordance with the Bank’s prevailing prescribed procedure at the time. (e) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled, in its reasonable discretion, to refuse to act on all or any Service Instructions; and the Bank shall be entitled in its reasonable discretion to require written confirmation of the Account Holder’s Service Instructions (even where identified by the Account Holder’s TBS Access Code), and to refuse to act on any such Service Instructions unless and until such written confirmation is received by the Bank. (f) The use of any TBS and the TBS Access Code is also subject to the Bank’s terms and conditions governing the type of Account or facility of which the TBS may be operated in connection therewith and nothing in these terms and conditions shall be construed as amending or varying those terms and conditions. (g) The Bank shall at its reasonable discretion, be entitled to change, de- activate or revoke the use of the TBS Access Code at any time without giving any reason but with reasonable notice to the Account Holder.
License of Data; Warranty; Termination of Rights A. The valuation information and evaluations being provided to the Trust by USBFS pursuant hereto (collectively, the “Data”) are being licensed, not sold, to the Trust. The Trust has a limited license to use the Data only for purposes necessary to valuing the Trust’s assets and reporting to regulatory bodies (the “License”). The Trust does not have any license nor right to use the Data for purposes beyond the intentions of this Agreement including, but not limited to, resale to other users or use to create any type of historical database. The License is non-transferable and not sub-licensable. The Trust’s right to use the Data cannot be passed to or shared with any other entity. The Trust acknowledges the proprietary rights that USBFS and its suppliers have in the Data. B. THE TRUST HEREBY ACCEPTS THE DATA AS IS, WHERE IS, WITH NO WARRANTIES, EXPRESS OR IMPLIED, AS TO MERCHANTABILITY OR FITNESS FOR ANY PURPOSE OR ANY OTHER MATTER. C. USBFS may stop supplying some or all Data to the Trust if USBFS’s suppliers terminate any agreement to provide Data to USBFS. Also, USBFS may stop supplying some or all Data to the Trust if USBFS reasonably believes that the Trust is using the Data in violation of the License, or breaching its duties of confidentiality provided for hereunder, or if any of USBFS’s suppliers demand that the Data be withheld from the Trust. USBFS will provide notice to the Trust of any termination of provision of Data as soon as reasonably possible.