- Discipline Policy and Procedures Sample Clauses

- Discipline Policy and Procedures. CTEA has established the following discipline policy and procedures as required by Idaho Code §§33-5205 (3)(m) and §§33-205. The disciplinary actions may be taken by the Director or designee. Since all discipline is intended to modify behavior and should fit the misbehavior, actions are suggestive and not necessarily conclusive nor sequential. In all disciplinary matters, students and parents have the right to due process and to appeal decisions to the next higher level of governance. CTEA has formally adopted and will review annually its student discipline policies and procedure.
AutoNDA by SimpleDocs
- Discipline Policy and Procedures. First Baptist Christian School endeavors to give children an education in an environment where each student is valued for their uniqueness and can achieve to the best of his/her ability. Discipline is a part of creating a safe learning environment, and a means of both training students in moral conduct, and of correcting student behavior. Assisting parents in the development of Godly character in their children is one of our primary goals. One of the ways in which this is done is by focusing on positive behavior, and at times assigning consequences for negative behavior. It is our desire at FBCS that our students would strive to obey the scriptures. Our key scripture verse is “Love the Lord your God with all your heart and with all your soul and with all your mind. This is the first and greatest commandment. And the second is like it: 'Love your neighbor as yourself.” Xxxxxxx 22:37-39. Character motivation, accompanied by scripture is used to positively influence behavior in the classroom. The discipline policy of FBCS is a classroom centered, teacher focused policy that is designed to give teachers the tools they need to maintain an optimal learning environment for students. In addition to our “All School Rules”, each classroom establishes clear and effective, age appropriate, classroom discipline rules and procedures. Our all school rules are as follows: Classroom discipline strategies include using verbal warnings for students, recovery areas, modified recess breaks, loss of privileges, reflection papers, lunchtime detention, and parent communication. Teachers may use progressive consequences and will keep a record of student behavior. Kindergarten to sixth grade use a leveled system in the classroom to monitor student behavior. All classes use daily logbooks that are also circulated to the special classes. The classroom teacher is required to maintain the discipline log. Each student is encouraged to set personal goals, and to take responsibility for their own actions. We strive to build positive peer pressure throughout the school by using strategies that teach children how to resolve conflict. A balance of rewards and consequences are used at FBCS to motivate and encourage students. Rewards may take the form of something tangible, or in a preferred activity such as additional computer or reading time. FBCS does not tolerate bullying throughout the school in any way whether child-child, child- teacher, teacher-parent. Bullying is an act of repeated ag...

Related to - Discipline Policy and Procedures

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Discipline Policy A Discipline Policy Committee will be formed upon the request of the Association or the Board of Education. The committee will be comprised of members appointed by the Board and the Association. By the appropriate means determined by the Board, families will be informed of the District's policies regarding student behavior and discipline procedures. The foregoing committees, study groups, or faculty councils shall serve as advisory, consultative and fact-finding bodies only, and the Board shall not be required to adopt any of the recommendations submitted. The Board agrees, however, that the Association and the teachers shall have the right to submit recommendations and views on these subjects.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees. 7.1.2 The Employees will observe and act in accordance with Company policies and procedures that apply to the Employees, as implemented and amended from time to time.

  • DISCIPLINE PROCEDURES The Employer agrees to provide the employee with written notification of a disciplinary document that is to be made a part of the employee’s personnel file. In instances where the Employer desires to conduct an investigatory interview with an employee, the employee shall be entitled upon request to have an Association representative present at the interview. A copy of all disciplinary actions involving suspension or discharge will also be provided to the Association, unless the employee requests that the matter be kept confidential.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!