Conhecimento da Lingua O Contratado, pelo presente instrumento, declara expressamente que tem pleno conhecimento da língua inglesa e que leu, compreendeu e livremente aceitou e concordou com os termos e condições estabelecidas no Plano e no Acordo de Atribuição (“Agreement” xx xxxxxx).
Night Shift Employees who are required to work at least five-eighths of their normal daily tour of duty after 4:30 p.m. and before 8:00 a.m. shall be paid at the rate of five percent over and above his/her normal biweekly or hourly rate of pay for the entire shift so worked.
Night Shift Premium All hours worked by an employee between ten (10:00) p.m. and seven (7:00) a.m. shall be considered as shift work and paid for at the applicable straight time/overtime rate plus two ($2.00) dollars per hour shift premium for each full hour worked during this period. Night-shift premium shall not be added to the employee’s hourly rate of pay for the purpose of computing overtime pay.
Complete Portfolio Holdings From Shareholder Reports Containing a Summary Schedule of Investments; and
Minimum Shipping Requirements for TIPS Sales Vendor shall ship, deliver, or provide ordered goods and services within a commercially reasonable time after acceptance of the order. If a delay in delivery is anticipated, Vendor shall notify the TIPS Member as to why delivery is delayed and provide an updated estimated time for completion. The TIPS Member may cancel the order if the delay is not commercially acceptable or not consistent with the Supplemental Agreement applicable to the order.
Gross Beta Flags A = Result acceptable, Bias <= +/- 50% with a statistically positive result at two standard deviations (Result/Uncertainty > 2, i.e., the range encompassing the result, plus or minus the total uncertainty at two standard deviations, does not include zero). N = Result not acceptable, Bias > +/- 50% or the reported result is not statistically positive at two standard deviations (Result/Uncertainty <= 2, i.e., the range encompassing the result, plus or minus the total uncertainty at two standard deviations, includes zero).
Voice Grade Unbundled Copper Sub-Loop Unbundled Sub-Loop Distribution – Intrabuilding Network Cable (aka riser cable)
Time Off Between Shifts Failure to provide the minimum number of hours between the commencement of an employee's scheduled shift and the commencement of such employee's next scheduled shift shall result in payment of one and one-half (1½) times the employee's regular straight time hourly rate for only those hours which reduce the minimum hour period. Where the minimum period is reduced as a result of an approved change of shift(s) requested by the employee(s), such premium payment shall not apply. The minimum number of hours for purposes of this Article shall be determined locally and will be set out in the Local Provisions Appendix.
Sector Sub-Sector Industry Classification Level of Government Type of Obligation Description of Measure Source of Measure All sectors : : - : Central : National Treatment Senior Management and Board of Directors : National Treatment and the Senior Management and Board of Directors obligations shall not apply to any measure relating to small and medium sized domestic market enterprise2. Foreign equity is restricted to a maximum of 40% for domestic market enterprises with paid-in equity capital of less than the equivalent of USD 200,000 Note: Members of the Board of Directors or governing body of corporation or associations shall be allowed in proportion to their allowable participation or share in the capital of such enterprises. : -1987 Constitution of the Republic of the Philippines. - Foreign Investments Act of 1991 (R.A. No. 7042, as amended by R.A. No. 8179). -Presidential and Administrative Issuances. ∞ 2 The concept of a small and medium sized domestic market enterprise is an enterprise with paid in equity capital of less than the equivalent of USD 200,000.00.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.