Detention and Arrest Sample Clauses

Detention and Arrest. Police have legal grounds to demand entry for weapon and drug searches and to arrest a person for an indictable offence, or to save lives. Police procedures to be followed in detainment or arrest and discharging specific obligations, such as the notification of parents/legal guardians, shall be in accordance with the Youth Criminal Justice Act and the Ministry Policing Standards Guideline LE-005 on arrest. The Criminal Code has provisions for detainment for the purpose of investigations. When it is necessary that a student be arrested at school during school hours, to the extent possible, such an arrest will be made in such a manner that will minimize disruption to the school. When a young person is arrested or detained, the discharging of specific obligations including the notification of parents/legal guardians is governed by the Youth Criminal Justice Act (section 26).
AutoNDA by SimpleDocs
Detention and Arrest. Where investigations result in detention and/or arrest, the police and the principal should pay particular attention to the following procedures and responsibilities. When possible, non-school related incidents resulting in the arrest of a student shall take place away from school property. Police should have regard to procedures in accordance with the Ministry of Community Safety and Correctional Services’ Guideline LE-005 on arrest and the Youth Criminal Justice Act. If the police wish to arrest or charge a student on school property, where possible the police officer shall contact the principal of the school that the student is attending and advise as to the nature of the visit and to request a meeting with the student. In the case of “fresh pursuit”, the police may not be able to advise the school administrator immediately of the reason for their actions but will advise the school administrator at the first opportunity of any students charged or arrested. Police have legal grounds to demand entry to arrest a person wanted for an indictable offence or to save lives. If the student who is being arrested, detained or charged by the police is under 18 years of age, the police shall inform that student about the nature of the charges and his/her rights. Subject to the Youth Criminal Justice Act, and in consultation with the police, the school will attempt to contact the student’s parents/guardians to inform them that their child is being arrested, detained or charged by the police. There may be times when the police will direct the school administrator not to contact the parents/guardians of a charged or arrested student, for example: i) The parents/guardians are the suspects of a crime about which the student is being interviewed and/or; ii) Contacting the parents/guardians could interfere with the police investigation. In such cases, the police determine the proper course of action. The school administrator will follow police direction in this regard and will document the name and badge number of the officer and the direction given. If a student is a Crown xxxx or a xxxx of the Children’s Aid Society, the legal guardian is the Children’s Aid Society and shall be contacted in the same way as a parent/guardian. If the student who is being arrested or charged by the police is 18 years of age or older, and therefore an adult, (or a 16 or 17 year old who has withdrawn from parental control), the school shall not contact the parents/guardians without the consen...

Related to Detention and Arrest

  • Confidentiality and Data Protection We are a data controller for the information you provide to us including individual, identification and financial details, policy history and special category data (such as medical or criminal history). Details of our legal basis for processing your information, along with details of any third party recipient whom it may be necessary to share your personal data with in order to fulfil the contract, retention period for data held, security of your data, your rights under the UK General Data Protection Regulations (UK GDPR) including the right to complain can be found in our full ‘Privacy Notice’ attached to these terms of business and/or on our website at xxx.xxxxxxxxxxxxxxxx.xx.xx.

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

  • Data Protection and Confidentiality 9.5.1 The Tenant’s personal data, which will be processed in the execution of this Agreement will be handled in accordance with the General Data Protection Regulation (EU) 2016/679. Further details regarding this processing activity is set out in the associated Privacy Notice, which can be found at: xxxxx://xxx.xxxxxxx.xxx/privacy-policy

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

  • PREVENTION OF BRIBERY 26.1 The Supplier represents and warrants that neither it, nor to the best of its knowledge any Supplier's Personnel, have at any time prior to the Commencement Date: (a) committed a Prohibited Act or been formally notified that it is subject to an investigation or prosecution which relates to an alleged Prohibited Act; and/or (b) been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act. 26.2 The Supplier shall not during the term of this agreement: (a) commit a Prohibited Act; and/or (b) do or suffer anything to be done which would cause the Authority or any of the Authority's employees, consultants, contractors, sub-contractors or agents to contravene any of the Bribery Act or otherwise incur any liability in relation to the Bribery Act. 26.3 The Supplier shall during the term of this agreement: (a) establish, maintain and enforce, and require that its Sub- contractors establish, maintain and enforce, policies and procedures which are adequate to ensure compliance with the Bribery Act and prevent the occurrence of a Prohibited Act; and (b) keep appropriate records of its compliance with its obligations under clause 26.3(a) and make such records available to the Authority on request. 26.4 The Supplier shall immediately notify the Authority in writing if it becomes aware of any breach of clause 26.1 and/or clause 26.2, or has reason to believe that it has or any of the Supplier's Personnel have: (a) been subject to an investigation or prosecution which relates to an alleged Prohibited Act; (b) been listed by any government department or agency as being debarred, suspended, proposed for suspension or debarment, or otherwise ineligible for participation in government procurement programmes or contracts on the grounds of a Prohibited Act; and/or (c) received a request or demand for any undue financial or other advantage of any kind in connection with the performance of this agreement or otherwise suspects that any person or Party directly or indirectly connected with this agreement has committed or attempted to commit a Prohibited Act. 26.5 If the Supplier makes a notification to the Authority pursuant to clause 26.4, the Supplier shall respond promptly to the Authority's enquiries, co-operate with any investigation, and allow the Authority to audit any books, records and/or any other relevant documentation in accordance with clause 22. 26.6 If the Supplier is in Default under clause 26.1 and/or clause 26.2, the Authority may by notice: (a) require the Supplier to remove from performance of this agreement any Supplier's Personnel whose acts or omissions have caused the Default; or (b) immediately terminate this agreement. 26.7 Any notice served by the Authority under clause 26.6 shall specify the nature of the Prohibited Act, the identity of the Party who the Authority believes has committed the Prohibited Act and the action that the Authority has elected to take (including, where relevant, the date on which this agreement shall terminate).

  • File Security and Retention; Confidentiality A. USBFS and its agents will provide reasonable security provisions to ensure that unauthorized third parties do not have access to the Trust’s data bases, files, and other information provided by the Trust to USBFS for use with the Electronic Services, the names of End Users or End User transaction or account data (collectively, “Trust Files”). USBFS’s security provisions with respect to the Electronic Services, the Trust’s web site(s) and the Trust Files will be no less protected than USBFS’s security provisions with respect to its own proprietary information. USBFS agrees that any and all Trust Files maintained by USBFS for the Trust hereunder shall be available for inspection by the Trust’s regulatory authorities during regular business hours, upon reasonable prior written notice to USBFS, and will be maintained and retained in accordance with applicable requirements of the 1940 Act. USBFS will take such actions as are necessary to protect the intellectual property contained within the Trust’s web site(s) or any software, written materials, or pictorial materials describing or creating the Trust’s web site(s), including all interface designs or specifications. USBFS will take such actions as are reasonably necessary to protect all rights to the source code and interface of the Trust’s web site(s). In addition, USBFS will not use, or permit the use of, names of End Users for the purpose of soliciting any business, product, or service whatsoever except where the communication is necessary and appropriate for USBFS’s delivery of the Electronic Services. B. USBFS shall treat as confidential and not disclose or otherwise make available any of the Trust’s lists, information, trade secrets, processes, proprietary data, information or documentation (collectively, the “Confidential Information”), in any form, to any person other than agents, employees or consultants of USBFS. USBFS will instruct its agents, employees and consultants who have access to the Confidential Information to keep such information confidential by using the same care and discretion that USBFS uses with respect to its own confidential property and trade secrets. Upon termination of the rights and responsibilities described in this Exhibit C for any reason and upon the Trust’s request, USBFS shall return to the Trust, or destroy and certify that it has destroyed, any and all copies of the Confidential Information which are in its possession. C. Notwithstanding the above, USBFS will not have an obligation of confidentiality under this Section with regard to information that (1) was known to it prior to disclosure hereunder, (2) is or becomes publicly available other than as a result of a breach hereof, (3) is disclosed to it by a third party not subject to a duty of confidentiality, or (4) is required to be disclosed under law or by order of court or governmental agency.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

  • Freedom of Information and Protection of Privacy Act Any information provided on this contract may be subject to release under the Freedom of Information and Protection of Privacy Act. The Contractor may be consulted prior to release of any information.

  • Preservation and Disclosure of Lists The Trustee shall preserve, in as current a form as is reasonably practicable, all information as to the names and addresses of the Holders contained in the most recent list furnished to it as provided in Section 5.01 or maintained by the Trustee in its capacity as Note Registrar, if so acting. The Trustee may destroy any list furnished to it as provided in Section 5.01 upon receipt of a new list so furnished.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!