EMERGENCY PROCEDURES AND NOTIFICATIONS Sample Clauses

EMERGENCY PROCEDURES AND NOTIFICATIONS. ‌ The HASP provides guidance on emergency procedures and notification. The HASP is reviewed annually by NWPGS operators and made available for inspection by employees, supervisors, health and safety personnel, and other government agencies having relevant responsibilities. The plans address the following: • Pre-emergency planning • Personnel roles, lines of authority, and communication • Emergency recognition and prevention • Spill response • Site security and controlEvacuation routes and procedures • Emergency alerting and response procedures • Personal protective equipment and emergency equipment
AutoNDA by SimpleDocs

Related to EMERGENCY PROCEDURES AND NOTIFICATIONS

  • Emergency Procedures All residents and guests are required to exit the building during emergencies that require evacuation and follow instructions given by authorized University emergency personnel (e.g., Security Services, Emergency Response Wardens and Building Emergency Captains). Residents and guests FIRE PROCEDURES AND FIRE ALARMS: All residents and guest(s) are required to exit the residences at the sound of a fire alarm. In the event of fire, residents and guest(s) are required to follow instruction given by Fire Services personnel.

  • Emergency Procedure An employee may be immediately placed on an off-duty status (without pay) by the Employer, but remain on the rolls where the allegation involves intoxication (use of drugs or alcohol), pilferage, or failure to observe safety rules and regulations, or in cases where retaining the employee on duty may result in damage to U.S. Postal Service property, loss of mail or funds, or where the employee may be injurious to self or others. The employee shall remain on the rolls (non-pay status) until disposition of the case has been had. If it is proposed to suspend such an employee for more than thirty (30) days or discharge the employee, the emergency action taken under this Section may be made the subject of a separate grievance.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Notification Procedures To address non-compliance, the receiving Competent Authority would notify the providing Competent Authority pursuant to Article 5 of the IGA. The notification procedures would differ depending upon whether the receiving Competent Authority seeks to address administrative or other minor errors or significant non-compliance.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Reply Procedures In connection with any Auction, each Lender holding the relevant Term Loans subject to such Auction may, in its sole discretion, participate in such Auction and may provide the Auction Agent with a notice of participation (the “Return Bid”) which shall be in a form reasonably acceptable to the Auction Agent, and shall specify (i) a discount to par (that must be expressed as a price at which it is willing to sell all or any portion of such Term Loans) (the “Reply Price”), which (when expressed as a percentage of the par principal amount of such Term Loans) must be within the Discount Range and (ii) a principal amount of such Term Loans, which must be in whole increments of $1,000,000 (or, in any case, such lesser amount of such Term Loans of such Lender then outstanding or which is otherwise reasonably acceptable to the Auction Agent) (the “Reply Amount”). Lenders may only submit one Return Bid per Auction, but each Return Bid may contain up to three bids only one of which may result in a Qualifying Bid. In addition to the Return Bid, the participating Lender must execute and deliver, to be held in escrow by the Auction Agent, an Assignment and Assumption with the dollar amount of the Term Loans to be assigned to be left in blank, which amount shall be completed by the Auction Agent in accordance with the final determination of such Lender’s Qualifying Bid pursuant to clause (c) below. Any Lender whose Return Bid is not received by the Auction Agent by the Auction Response Date shall be deemed to have declined to participate in the relevant Auction with respect to all of its Term Loans.

  • Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!