FIRST AID AND EMERGENCY EQUIPMENT Sample Clauses

FIRST AID AND EMERGENCY EQUIPMENT. 11.1 The Mandatary shall ensure that, where more than five employees are employed at the Premises, a first aid box is made readily available as per General Safety Regulation 3(2). If the Mandatary employs more than 10 employees the Mandatary shall ensure that a certificated first aid provider is available. Provided that the Mandatary may enter into a written arrangement with the Employer for the provision of such first aid facilities.
AutoNDA by SimpleDocs

Related to FIRST AID AND EMERGENCY EQUIPMENT

  • Emergency Escalation Escalation is strictly for purposes of notifying and investigating possible or potential issues in relation to monitored services. The initiation of any escalation and the subsequent cooperative investigations do not in themselves imply that a monitored service has failed its performance requirements. Escalations shall be carried out between ICANN and Registry Operators, Registrars and Registry Operator, and Registrars and ICANN. Registry Operators and ICANN must provide said emergency operations departments. Current contacts must be maintained between ICANN and Registry Operators and published to Registrars, where relevant to their role in escalations, prior to any processing of an Emergency Escalation by all related parties, and kept current at all times.

  • Protective Equipment 21.01 All employees shall wear safety hats to be made available by the Employer.

  • Personal Protective Equipment (PPE 1. The Centers for Disease Control and Prevention (CDC) does not recommend personal protective equipment (PPE) beyond a face covering when interacting with asymptomatic individuals who are not known to have COVID-19.

  • Elements Unsatisfactory Needs Improvement Proficient Exemplary IV-A-1. Reflective Practice Demonstrates limited reflection on practice and/or use of insights gained to improve practice. May reflect on the effectiveness of lessons/ units and interactions with students but not with colleagues and/or rarely uses insights to improve practice. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues, and uses insights gained to improve practice and student learning. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues; and uses and shares with colleagues, insights gained to improve practice and student learning. Is able to model this element.

  • Personal Protective Equipment 64.1 While not being part of any issue of work clothing/equipment supplied (see clause 26), the Employer shall be required to provide personal protective equipment (SAA approved) for use, when necessary for the Employee to perform their required duties including:

  • Emergency Escalation initiated by ICANN Upon reaching 10% of the Emergency thresholds as described in Section 6 of this Specification, ICANN’s emergency operations will initiate an Emergency Escalation with the relevant Registry Operator. An Emergency Escalation consists of the following minimum elements: electronic (i.e., email or SMS) and/or voice contact notification to the Registry Operator’s emergency operations department with detailed information concerning the issue being escalated, including evidence of monitoring failures, cooperative trouble-­‐shooting of the monitoring failure between ICANN staff and the Registry Operator, and the commitment to begin the process of rectifying issues with either the monitoring service or the service being monitoring.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Damage, Destruction and Condemnation In the event that at any time during the Term the whole or part of the Facility shall be damaged or destroyed, or taken or condemned by a competent authority for any public use or purpose, or by agreement to which the Lessee and those authorized to exercise such right are parties, or if the temporary use of the Facility shall be so taken by condemnation or agreement (a “Loss Event”):

  • Damage to Equipment The Parties shall exercise all necessary precautions to avoid causing damage to the other Party’s poles and Equipment and other pole attachers’ Equipment and shall assume responsibility to each other for any and all loss from any damage to the other Party’s poles or Equipment and reimburse the other Party for the entire expense incurred in making such repairs. Each Party shall assume responsibility to third parties for any and all loss from any damage caused to third party’s Equipment by such Party and shall reimburse such third party for the entire expense incurred in making repairs.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

Time is Money Join Law Insider Premium to draft better contracts faster.