Cultural Security Sample Clauses

Cultural Security. In undertaking this role, the incumbent is required to have a sound understanding about Ways of Working with Aboriginal people.
AutoNDA by SimpleDocs
Cultural Security. The Department’s Cultural Security Policy requires that the health services offered to Aboriginal Territorians by CAHS will respectfully recognise and respond to their cultural rights and values in service planning, delivery and evaluation. CAHS commits to working collaboratively with the System Manager to ensure that systems and processes are in place to facilitate culturally secure health services by providing evidence that: • Aboriginal communities and representatives are actively engaged in health service planning, delivery and evaluation • health services offer and provide Aboriginal Territorians with language assistance services in their preferred language at all points of contact wherever possible • staff are aware of the cultural security policies/initiatives and their implications for practice models/service delivery • staff at all levels have access to and participate in cultural security /awareness training and education • Aboriginal workforce initiatives are actioned to: o increase the number of Aboriginal people employed across all levels and professional streams o develop capacity of the existing Aboriginal workforce through training and career development opportunities.
Cultural Security. Improved cultural security in health service delivery in all organisations providing care to Aboriginal and Xxxxxx Xxxxxx Islander people. Initiative Key Performance benchmarks
Cultural Security. The Department’s Cultural Security Policy requires that the health services offered to Aboriginal Territorians by TEHS will respectfully recognise and respond to their cultural rights and values in service planning, delivery and evaluation. XXXX commits to working collaboratively with the System Manager to ensure that systems and processes are in place to facilitate culturally secure health services by providing evidence that:
Cultural Security. Improved cultural security in health service delivery in all organisations providing care to Aboriginal and Xxxxxx Xxxxxx Islander people. To ensure health services are respectful of, and responsive to, the needs of Aboriginal and Xxxxxx Xxxxxx Islander people, targeted investment is required to improve the quality and cultural security of health service delivery. ▪ A number of QH initiatives under this NPA will work to improve the quality and cultural security of health service delivery by ensuring the importance of cultural security is embedded in policy, in training and at the service front, these initiatives include: − Aboriginal and Xxxxxx Xxxxxx Islander Cultural Capability Framework (see initiative 6.4) − Queensland Framework Indigenous Primary Health Care (see initiative QG2) − Southern Queensland Centre for Excellence in Indigenous Primary Health Care Centre (see initiative QG3) − Aboriginal and Xxxxxx Xxxxxx Islander Hospital Liaison Service (see initiative QG 6.3) 3 IMPLEMENTATION PLAN Implementation will be undertaken consistent with the following principles: 1. National Service Delivery Principles for Indigenous Australians (Appendix A); 2. National Principles for Investment in Remote Locations (Appendix B); and 3. Queensland’s Guiding Principles for Implementation (Appendix C). To have an impact on the Performance Indicators in this NPA will require the collective effort of initiatives to be rolled out by both the Queensland Government and Commonwealth Government: Priority Area Objective Performance Indicators
Cultural Security. ‌ Culture as a social function creates obligations and responsibilities and establishes an order that binds individuals, families and communities together. Culture and identity is central to health and ill health. How Aboriginal people view wellness and illness is in part based on cultural beliefs and values. At the service interface these perceptions and the social interaction surrounding them influence when and why Aboriginal communities access services, their acceptance or rejection of treatment, the likelihood of compliance and follow up, the likely success of prevention and health promotion strategies, the client’s assessment of the quality of care and views of health care providers and personnel. Cultural security is a commitment that the construct of effective clinical care, public health, health systems administration and the provision of services offered by the health and wellbeing system will not compromise the legitimate cultural rights, views and values of Aboriginal people. The crux of the move to Cultural security is a shift in emphasis from attitude to behaviour, ensuring that the delivery of health services is of such a quality that no one person is afforded a less favourable outcome simply because they hold a different cultural outlook. Cultural security recognises that a more respectful and responsive health system will contribute to improved outcomes and greater efficiency. Increasingly the medical profession has recognised that ‘health care belief systems are critical to the patient’s healing processes and overseas studies have shown that the practice and advice of traditional healers is often valued more highly than the advice from western medical practitioners. Cultural security in health service provision is also emerging as a risk minimisation and cost containment issue with some overseas providers adopting this approach in an effort to improve market share, contain costs, improve outcomes and improve quality. Some overseas malpractice insurers offer premium discounts to doctors who take cultural security or competence into their practice. Cultural security enriches the competence of practitioners and administrators in the design, delivery and evaluation of health services. Key target areas are: • Implementation of the Cultural Security policy • Cultural Security Guidelines for Managers • Aboriginal positions employed in the health and wellbeing system including promotion of Aboriginal staff into senior positions • Cultural leave • ...
Cultural Security. 5 IMPLEMENTATION PLAN 6 RISK MANAGEMENT 28 REVIEW AND EVALUATION 28 APPENDIX A: NATIONAL INDIGENOUS REFORM AGREEMENT’S SERVICE DELIVERY PRINCIPLES FOR INDIGENOUS AUSTRALIANS 30 1.1 Priority 30 1.2 Indigenous engagement 30 1.3 Sustainability 30 1.4 Access 31
AutoNDA by SimpleDocs

Related to Cultural Security

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

  • National Security 28.01 The Canadian government, either directly or through its agencies, may instruct the Employer with respect to the security of information and materials and the personnel permitted to do certain work. The Union recognizes that the Employer is obliged to meet such instructions and that for such reason the Employer may refuse certain Employees access to the work or may transfer Employees covered by such instructions.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Physical Security Contractor shall ensure that Medi-Cal PII is used and stored in an area that is physically safe from access by unauthorized persons during working hours and non- working hours. Contractor agrees to safeguard Medi-Cal PII from loss, theft or inadvertent disclosure and, therefore, agrees to: A. Secure all areas of Contractor facilities where personnel assist in the administration of the Medi-Cal program and use or disclose Medi-Cal PII. The Contractor shall ensure that these secure areas are only accessed by authorized individuals with properly coded key cards, authorized door keys or access authorization; and access to premises is by official identification. B. Ensure that there are security guards or a monitored alarm system with or without security cameras 24 hours a day, 7 days a week at Contractor facilities and leased facilities where a large volume of Medi-Cal PII is stored. C. Issue Contractor personnel who assist in the administration of the Medi-Cal program identification badges and require County Workers to wear the identification badges at facilities where Medi-Cal PII is stored or used. D. Store paper records with Medi-Cal PII in locked spaces, such as locked file cabinets, locked file rooms, locked desks or locked offices in facilities which are multi-use (meaning that there are personnel other than contractor personnel using common areas that are not securely segregated from each other.) The contractor shall have policies which indicate that Contractor and their personnel are not to leave records with Medi-Cal PII unattended at any time in vehicles or airplanes and not to check such records in baggage on commercial airlines. E. Use all reasonable measures to prevent non-authorized personnel and visitors from having access to, control of, or viewing Medi-Cal PII.

  • Financial Security 5.4.1. To provide financial security the Company is entitled to request from the Client a confirmation of the verification of personal data submitted at the registration of a trading account. For this purpose the Company may at any moment ask the Client to submit a copy of a passport or other equivalent document, certified by a notary (at Company’s discretion). 5.4.2. The Company is entitled to prohibit to deposit or withdraw funds to the third parties. 5.4.3. In case of indication or suspicion of any form of Client's fraudulent activity or violation of conditions of Customer Agreement, the Company in its sole discretion will be entitled to suspend all transactions of deposits or withdrawals.

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Collateral Security (a) The Obligations shall be secured by (a) a perfected first-priority security interest (subject to Permitted Liens entitled to priority under Applicable Law) in all Collateral, whether now owned or hereafter acquired, pursuant to the terms of the Security Agreement to which each Borrower is a party to the extent perfected by the filing of UCC financing statements; (b) a pledge of 100% of the capital stock or other Equity Interests of such Borrowers (other than the Parent) and of the Non-Borrower Subsidiaries (other than the Foreign Subsidiaries) to the Administrative Agent on behalf of the Secured Parties pursuant to the Pledge Agreement; and (c) a pledge of the capital stock or other Equity Interests of each Foreign Subsidiary (provided that not more than 65% of the total voting power of all outstanding capital stock or other Equity Interest of any such first-tier Foreign Subsidiary of a Borrower shall be required to be so pledged and no Equity Interests of any non-first-tier Foreign Subsidiary shall be provided to be so pledged); provided that the Borrowers hereby agree, upon the request of the Administrative Agent and the Required Lenders, to deliver, as promptly as practicable, but in any event within ninety (90) days after request therefor, or such other later time, if any, to which the Administrative Agent may agree, (i) certificates of titles for all or substantially all vehicles, trucks, trailers, tractors, automobiles and any other equipment covered by certificates of title owned by a Borrower (collectively, “Motor Vehicles”) with the Administrative Agent listed as lienholder therein (subject to a limited power of attorney in favor of the Parent to dispose of titled equipment) and, if required by the Administrative Agent, the Borrowers shall retain Corporation Service Company (or other similar company satisfactory to the Administrative Agent) pursuant to agreements reasonably satisfactory to the Administrative Agent pursuant to which Corporation Service Company (or such other company) will agree to act as agent for the Secured Parties with respect to the perfection of security interests in the Motor Vehicles; and (ii) mortgages with respect to Real Property and to take such other steps and make such other deliveries as may be reasonably requested by the Administrative Agent (including, without limitation, the delivery of legal opinions, Consulting Engineer’s reports, surveys, title insurance, environmental assessment reports, flood hazard certifications, evidence of flood insurance, if required, and a certification of the name and address of each real estate recording office where a mortgage on the real estate on which any Collateral consisting of fixtures may be located would be recorded) so as to provide the Administrative Agent, for the benefit of the Secured Parties, a perfected first-priority security interest in such assets, provided that to the extent that any lease of (or operating/management agreement with respect to) Real Property prohibits assignment of such lease (or operating/management agreement) without the consent of the lessor or another party thereunder, the Borrowers shall not be required to grant a mortgage on the leasehold interest under such lease, but in such event, the Borrowers agree to diligently and in good faith use its reasonable best efforts to obtain the consent (which consent shall be in form and substance reasonably satisfactory to the Administrative Agent) of the applicable lessor or other party to such leasehold mortgage (and, upon the receipt of such consent, the Borrowers shall promptly grant such leasehold mortgage and comply with the other provisions of this Section 10.15 with respect thereto). (b) In the event any Borrower disposes of any assets or Equity Interests as permitted under, and in compliance with, Section 7.04(b) (including any amendment thereof or consent thereunder), or in the event that the Parent designates any Borrower as an Excluded Subsidiary or a Non-Borrower Subsidiary hereunder and no Default would result from such designation, and so long as such Borrower (or the Parent, in the case of designating a Borrower as an Excluded Subsidiary hereunder) shall have provided the Administrative Agent with such certifications or documents, if any, as the Administrative Agent shall reasonably request, the Administrative Agent will, at the Borrowers’ sole cost and expense, and without recourse to or warranty by the Administrative Agent, execute and deliver all such forms, releases, discharges, assignments, termination statements, and similar documents as the Borrowers may reasonably request in order to release such Person from its Obligations under the Loan Documents and to release the Liens granted to the Administrative Agent with respect to such assets, Equity Interests or Borrower, as applicable.

  • Organizational Security It is the responsibility of the individuals across the organization to comply with these practices and standards. To facilitate the corporate adherence to these practices and standards, the function of information security provides:

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!