Display of blue signal Sample Clauses

Display of blue signal. (a) Class of Employee i) Each class of employee must display Blue Signals and personal locks and the same class of employee is alone authorized to remove them. ii) Within each class of employee the manager or other responsible person as designated by the manager in charge will display and remove Blue Signals and personal locks.
AutoNDA by SimpleDocs

Related to Display of blue signal

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section. 1.10.1 Registry Operator will offer searchability on the web-­‐based Directory Service. 1.10.2 Registry Operator will offer partial match capabilities, at least, on the following fields: domain name, contacts and registrant’s name, and contact and registrant’s postal address, including all the sub-­‐fields described in EPP (e.g., street, city, state or province, etc.). 1.10.3 Registry Operator will offer exact-­‐match capabilities, at least, on the following fields: registrar id, name server name, and name server’s IP address (only applies to IP addresses stored by the registry, i.e., glue records). 1.10.4 Registry Operator will offer Boolean search capabilities supporting, at least, the following logical operators to join a set of search criteria: AND, OR, NOT. 1.10.5 Search results will include domain names matching the search criteria. 1.10.6 Registry Operator will: 1) implement appropriate measures to avoid abuse of this feature (e.g., permitting access only to legitimate authorized users); and 2) ensure the feature is in compliance with any applicable privacy laws or policies.

  • Waste and Nuisance (a) Tenant shall not commit or permit any waste, including waste as it is defined in the Waste Management Act, S.B.C. 1979 c.41, as amended from time to time, to be brought upon, kept, or used in or about the Premises, the Building, or the Project by Tenant, its agents, employees, contractors or invitees, without the prior written consent of Landlord. (b) Tenant shall not commit or permit any damage to the Premises, the Building, or the Project, including the Leasehold improvements and trade fixtures therein. (c) Tenant shall not commit or permit any nuisance in or around the Premises, the Building, or the Project or any use or manner of use causing annoyance to other persons. (d) Except only as may be otherwise permitted under Subsection 1.9(h) below, Tenant shall not use or permit to be used any part of the Premises, the Building, or the Project for any trade or business which is, in the reasonable opinion of Landlord, dangerous, noxious or offensive. (e) Except only as may be otherwise permitted under Subsection 1.9(h) below, Tenant shall not cause or suffer or permit any waste, oil or grease or any harmful, objectionable, dangerous, poisonous or explosive matter or substance to be discharged into the Premises, the Building, or the Project. (f) Tenant shall not place any objects on or otherwise howsoever obstruct the heating or air conditioning vents within the Premises or the Building. (g) Tenant shall keep the Premises free of debris, anything which could create a fire hazard (through undue load on electrical circuits or otherwise) or cause undue vibration, heat or noise. (h) Except as necessary to the ordinary operation of Tenant’s business conducted in compliance with all applicable laws, rules and regulations, Tenant shall keep the Premises free of rodents, vermin and anything of a dangerous, noxious or offensive nature. Tenant shall at all times keep Landlord informed of the presence in the Premises of any rodents or vermin or anything of a dangerous, noxious or offensive nature necessary to the ordinary operation of Tenant’s business conducted in compliance with all applicable laws, rules and regulations, and Tenant shall ensure that they are at all times confined within the Premises, stored and used in compliance with all applicable laws, rules and regulations, and do not cause any nuisance or annoyance to other persons.

  • Publicity and Use of Trademarks or Service Marks 34.1 A Party, its Affiliates, and their respective contractors and Agents, shall not use the other Party’s trademarks, service marks, logos or other proprietary trade dress, in connection with the sale of products or services, or in any advertising, press releases, publicity matters or other promotional materials, unless the other Party has given its written consent for such use, which consent the other Party may grant or withhold in its sole discretion. 34.2 Neither Party may imply any direct or indirect affiliation with or sponsorship or endorsement of it or its services or products by the other Party. 34.3 Any violation of this Section 34 shall be considered a material breach of this Agreement.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Rectification of Safety Hazard Where, because of the existence of a safety hazard, a site has been stopped for a defined period of time and Employees sent off site by agreement between Site Managers and any combination of Union Official/s, Health and Safety Committee, those people who remain on site to do rectification work will be paid at the rate of double time for all such work.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Signs; Exterior Appearance Tenant shall not, without the prior written consent of Landlord, which may be granted or withheld in Landlord’s sole discretion: (i) attach any awnings, exterior lights, decorations, balloons, flags, pennants, banners, painting or other projection to any outside wall of the Project, (ii) use any curtains, blinds, shades or screens other than Landlord’s standard window coverings, (iii) coat or otherwise sunscreen the interior or exterior of any windows, (iv) place any bottles, parcels, or other articles on the window xxxxx, (v) place any equipment, furniture or other items of personal property on any exterior balcony, or (vi) paint, affix or exhibit on any part of the Premises or the Project any signs, notices, window or door lettering, placards, decorations, or advertising media of any type which can be viewed from the exterior of the Premises. Interior signs on doors and the directory tablet shall be inscribed, painted or affixed for Tenant by Landlord at the sole cost and expense of Tenant, and shall be of a size, color and type acceptable to Landlord. Nothing may be placed on the exterior of corridor walls or corridor doors other than Landlord’s standard lettering. The directory tablet shall be provided exclusively for the display of the name and location of tenants.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!