Faculty and Staff Exchanges Sample Clauses

Faculty and Staff Exchanges. The two institutions agree in principle to the possibility of exchanges by Faculty and general staff (Administrative and Technical). The details of such arrangements will be negotiated at the appropriate time and will be governed by the institutional staffing rules and relevant approval processes. The participating institutions shall not be responsible for any private arrangements made by participating staff members concerning exchange of accommodation, vehicles, etc.
AutoNDA by SimpleDocs
Faculty and Staff Exchanges. It is hoped that there will be an exchange of academic staff who will give a series of lectures for periods ranging from a week to a semester. The two institutions agree in principle to the possibility of other staff exchanges as well. The details of such arrangements will be negotiated when appropriate and a covenant will be agreed upon when relevant.
Faculty and Staff Exchanges. The parties agree in principle to exchanges of faculty and administrative staff. The details will be negotiated in advance and will be governed by both partiesrules and policies. The parties are not responsible for any arrangements made by participants for exchange of accommodations, cars, etc.
Faculty and Staff Exchanges. The two institutions recognise the benefit derived from the exchange of Academic staff and Administrative staff. The details of such arrangements will be negotiated as appropriate and will be governed by the institutional staffing rules and relevant approval processes.
Faculty and Staff Exchanges. The exchange of academic and other staff will be encouraged by this agreement. The teaching assignment could be for a full semester or a limited period, e.g. in a summer school. The details of such arrangements will be negotiated at the appropriate time. Furthermore, both universities will strive to develop linkages between faculty that will lead to the sharing of ideas and, where feasible, research collaboration.

Related to Faculty and Staff Exchanges

  • PROMOTIONS AND STAFF CHANGES 11.01 Job Postings a) When a vacancy occurs or a new position is created for a regular position which the Employer has decided to fill it shall be posted on all bulletin boards for five (5) working days and filled within forty (40) working days of the posting closing. Positions may be advertised in the media only after the Employer has determined an internal applicant is not the successful applicant. Where the Employer decides not to fill a vacant position, the Employer will provide an explanation to the Union if so requested. b) The Employer, on a temporary basis, may fill a posted position during the posting and selection period. c) For temporary positions of up to forty-two (42) days, a posting is not required. Positions of longer than forty-two (42) days (seventy-eight (78) days only in the case of temporary aquatic program positions) shall be posted except where the vacancy is created by the absence of an Employee due to vacation. d) If a temporary position is made into a regular position, the new regular position shall be posted at least 14 days prior to the end of the temporary position. (i) A posting shall include the following information: Nature of position, qualifications, skills, required knowledge and education, current shift hours and days, number of hours of work per week, and wage rate. (ii) Such qualifications may not be established in an arbitrary or discriminatory manner, and shall reflect the contents of the Job Description. 11.02 Role of Seniority in Appointments, Promotions, Demotions and Transfers a) Both parties recognize the principle of promotion within the service of the Employer in the bargaining unit (i) For classifications required by their job description to supervise other employees in the bargaining unit listed in XXX#4, appointments, promotions, demotions, and transfers shall be based on the ability, knowledge, qualifications and seniority of the Regular Employees considered. Where the ability, qualifications and knowledge of the applicants are relatively equal, the senior applicant will be the successful candidate. (ii) For all other classifications, where the ability, qualifications and knowledge are sufficient to perform the functions of the posted position, the senior applicant shall be appointed. c) If the position is not filled by a Regular Employee in (i) or (ii) above, the ability and qualifications of Casual, Temporary and Seasonal Employees shall be considered, and if relatively equal, the senior applicant as determined in Article 10.05 shall be appointed. d) If the position is not filled by an Employee in b (i), (ii), or c) above, all other applicants shall be considered.

  • Provisions governing staff and subcontractors A. To require any subcontractor to execute documents that binds the subcontractor to comply with the provisions of this Contract. Subcontractor means an individual or entity to which the Contractor has contracted with or delegated some of its management functions or responsibilities of providing all or a part of the services required of the Contractor under this Contract. B. That it is responsible for the behavior of its staff and subcontractors to ensure a violence-free contractual relationship. The Contractor understands that any remarks, gestures or actions toward HHSC employees, volunteers or clients that carry an implied threat of any kind, even if intended to be in jest, will be taken seriously and may lead to corrective action, up to and including terminating this contractor. C. To comply with the requirements of the Immigration Reform and Control Act of 1986 regarding employment verification and retention of verification forms for an individual hired on or after November 6, 1986, who will perform any labor or services under this Contract. D. To certify and ensure that it utilizes and will continue to utilize, for the term of this Contract, the U. S. Department of Homeland Security's e- Verify system to determine the eligibility of: 1. all people employed during the Contract term to perform duties within Texas; and 2. all people (including subcontractors). E. That representatives of HHSC, AG-MFCU and HHS may conduct interviews of Contractor personnel, subcontractors and their personnel, witnesses, and clients without a Contractor's representative present unless the person interviewed voluntarily requests that the representative be present. The Contractor must not coerce its personnel, subcontractors and their personnel, witnesses, or clients to accept representation by the Contractor, and the Contractor agrees that no retaliation will occur to a person who denies the Contractor's offer of representation. Nothing in the Contract limits a person's right to counsel of his or her choice. Requests for interviews are to be complied with in the form and the manner requested. The Contractor must ensure by contract or other means that its personnel and subcontractors cooperate fully in any investigation conducted by representatives of HHSC, AG-MFCU and HHS. F. That if it is a Home and Community Support Services agency ("HCSSA"), the Contractor will hire Personal Assistance Services and Community Support Services providers chosen by the client or the client's legally authorized representative, if requested, and provided the individual who will provide the services: 1. meets minimum qualifications for the service; 2. is willing to be employed as an attendant by the Contractor; and 3. is willing, and determined competent by the Contractor, to deliver the service(s) according to the client's individual service plan.

  • Introduction and Statement of Policy The National Institutes of Health (NIH) has established NIH-designated data repositories (e.g., database of Genotypes and Phenotypes (dbGaP), Sequence Read Archive (SRA), NIH Established Trusted Partnerships) for securely storing and sharing controlled-access human data submitted to NIH under the NIH Genomic Data Sharing (GDS)

  • Limitation on Out-of-State Litigation - Texas Business and Commerce Code § 272 This is a requirement of the TIPS Contract and is non-negotiable. Texas Business and Commerce Code § 272 prohibits a construction contract, or an agreement collateral to or affecting the construction contract, from containing a provision making the contract or agreement, or any conflict arising under the contract or agreement, subject to another state’s law, litigation in the courts of another state, or arbitration in another state. If included in Texas construction contracts, such provisions are voidable by a party obligated by the contract or agreement to perform the work. By submission of this proposal, Vendor acknowledges this law and if Vendor enters into a construction contract with a Texas TIPS Member under this procurement, Vendor certifies compliance.

  • Pending Procedures and Examinations The Registration Statement is not the subject of a pending proceeding or examination under Section 8(d) or 8(e) of the 1933 Act, and the Company is not the subject of a pending proceeding under Section 8A of the 1933 Act in connection with the offering of the Securities.

  • Reservation and Listing The Company shall at all times reserve and keep available out of its authorized Shares, solely for the purpose of issuance upon exercise of the Purchase Warrants, such number of Shares or other securities, properties or rights as shall be issuable upon the exercise thereof. The Company covenants and agrees that, upon exercise of the Purchase Warrants and payment of the Exercise Price therefor, in accordance with the terms hereby, all Shares and other securities issuable upon such exercise shall be duly and validly issued, fully paid and non-assessable and not subject to preemptive rights of any shareholder. The Company further covenants and agrees that upon exercise of the Purchase Warrants and payment of the exercise price therefor, all Shares and other securities issuable upon such exercise shall be duly and validly issued, fully paid and non-assessable and not subject to preemptive rights of any shareholder. As long as the Purchase Warrants shall be outstanding, the Company shall use its commercially reasonable efforts to cause all Shares issuable upon exercise of the Purchase Warrants to be listed (subject to official notice of issuance) on all national securities exchanges (or, if applicable, on the OTC Bulletin Board or any successor trading market) on which the Shares issued to the public in the Offering may then be listed and/or quoted.

  • File Naming Conventions Files will be named according to the following convention: {gTLD}_{YYYY-MM-DD}_{type}_S{#}_R{rev}.{ext} where: {gTLD} is replaced with the gTLD name; in case of an IDN-TLD, the ASCII-compatible form (A-Label) must be used; {YYYY-MM-DD} is replaced by the date corresponding to the time used as a timeline watermark for the transactions; i.e. for the Full Deposit corresponding to 2009-08-02T00:00Z, the string to be used would be “2009-08-02”; {type} is replaced by: “full”, if the data represents a Full Deposit; “diff”, if the data represents a Differential Deposit; “thin”, if the data represents a Bulk Registration Data Access file, as specified in Section 3 of Specification 4; {#} is replaced by the position of the file in a series of files, beginning with “1”; in case of a lone file, this must be replaced by “1”. {rev} is replaced by the number of revision (or resend) of the file beginning with “0”: {ext} is replaced by “sig” if it is a digital signature file of the quasi-homonymous file. Otherwise it is replaced by “ryde”.

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Certification Regarding Use of State Funds If Party is an employer and this Agreement is a State-funded grant in excess of $1,001, Party certifies that none of these State funds will be used to interfere with or restrain the exercise of Party’s employee’s rights with respect to unionization.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!