Cost Principles The Subrecipient shall administer its program in conformance with 2 CFR Part 200, et al; (and if Subrecipient is a governmental or quasi-governmental agency, the applicable sections of 24 CFR 85, “Uniform Administrative Requirements for Grants and Cooperative Agreements to State and Local Governments,”) as applicable. These principles shall be applied for all costs incurred whether charged on a direct or indirect basis.
Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.
Rules and Procedures The Benefit Society By-Laws will be amended to provide for a 6th Director with three Directors appointed by the Unions and three Directors appointed by the Corporation.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Endorsements and Procedures You agree to restrictively endorse any item transmitted through our RDC service by either: • Signing the back of the item with your name and the words “For Mobile Deposit Only” • Following other instructions provided by us. You agree to follow any and all further procedures and instructions for use of our RDC service that we may communicate to you through changes to this agreement or through other notice we provide to you. You agree to securely retain each item for no fewer than 90 days after deposit. Then, no fewer than 90 days after deposit, you agree to mark each item submitted via our RDC service as “Void” and dispose of it using a high degree of care to ensure the item cannot be transmitted, deposited, or presented again. We reserve the right to impose daily limits on the aggregate amount of and/or number of deposits you may make using our RDC service. We may modify these limits at any time and without notice. Current limits are presented to you in our RDC service interface. Your enrollment in our RDC services generally occurs when you become an account owner; however, we reserve the right to deny your enrollment in and terminate your access to RDC service at our sole discretion. You warrant to us that: • You will only transmit eligible items that are properly endorsed. • You will not transmit duplicate items. • All information you provide to us when using our RDC service is accurate and true. • We will not sustain a loss because you have deposited an item. • You will indemnify us from any loss for breach of this warranty provision. In general, if an image of an item you transmit using RDC is received and accepted before 4:00 p.m. ET on a business day we are open, we consider that day to be the day of that deposit, subject to the other terms and conditions herein. Otherwise, we may consider the deposit to be made on the next Business Day we are open. Funds deposited using our RDC service will generally be made available by the third business day from the day of deposit. However, we generally make the first $225 of the aggregate of your checks deposited through our RDC service on each business day available by the next business day. We may delay the availability of your funds for a longer period of time at our discretion if we deem it appropriate in accordance with our policies and procedures.