Expanded and Improved Job Security Protection Sample Clauses

Expanded and Improved Job Security Protection. The Company agrees that effective upon the filing of the Certificate of Merger pursuant to the terms of the Agreement and Plan of Merger, dated as of May 13, 2009, as amended, by and among Verizon Communications Inc., New Communications Holdings Inc. and Frontier Communications Corporation (“Merger Agreement” hereinafter) and through August 2, 2013, it will not layoff, downgrade or involuntarily terminate the employment, other than for “cause” under the CWA West Virginia collective bargaining agreement applicable to the WV Spinco employees, of any Spinco Employee in the state of West Virginia represented by the Unions who, as of the date of the filing of the Certificate of Merger, is actively employed or, if not actively employed, is on a leave of absence or other authorized absence with a right of continued employment or reinstatement. Further, the Company agrees to honor the language of Article 23 of the current collective bargaining agreement applicable to the WV Spinco employees concerning any forced transfers to meet the job security provisions of this Memorandum of Agreement noted above including the protection prohibiting the Company from force transfers for those employees hired prior to Aug. 2, 2003. 1 “Spinco Employee” wherever it appears in this Memorandum shall have the meaning ascribed to it in the Employee Matters Agreement, dated as of May 13, 2009, by and among Verizon Communications Inc., a Delaware corporation (“Verizon”), New Communications Holdings Inc. (“Spinco”), a Delaware corporation, and the Company. Any further references in this Memorandum of Agreement to Employee Matters Agreement are to the agreement just described.
AutoNDA by SimpleDocs
Expanded and Improved Job Security Protection 

Related to Expanded and Improved Job Security Protection

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Removal of Equipment and Materials Within 30 days after completion of the requirements of this contract, PURCHASER shall remove from the areas of operations, and other property owned or controlled by STATE, all equipment, materials, and other property PURCHASER has placed or caused to be placed thereon that is not to become the property of STATE. It is agreed that any such equipment, materials, and other property that are not removed within 30 days, shall become the property of STATE and may be used or otherwise disposed of by STATE without notice or obligation to PURCHASER or to any party to whom PURCHASER may transfer title. Nothing in this section shall be construed as relieving PURCHASER from an obligation to clean up and to burn, remove, or dispose of debris, waste materials, and such, in accordance with the provisions of this contract. PURCHASER shall indemnify STATE for expenses as a result of cleanup, removal or disposal of debris, waste materials, and such.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Required Procurement Procedures for Obtaining Goods and Services The Grantee shall provide maximum open competition when procuring goods and services related to the grant-assisted project in accordance with Section 287.057, Florida Statutes.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section.

Time is Money Join Law Insider Premium to draft better contracts faster.