GUIDELINES CONCERNING SECURITY PROCEDURES Sample Clauses

GUIDELINES CONCERNING SECURITY PROCEDURES. The Security Procedures principles shall apply in accordance with Appendix C (Guidelines Concerning Security Procedures).
AutoNDA by SimpleDocs
GUIDELINES CONCERNING SECURITY PROCEDURES. 45.1 Team Member Interviews 45.1.1 When Officeworks is trying to discover whether, or by whom, there has been a breach of Company policy and/or procedure, they are entitled to question any Team Member, whether suspect or not, from who they may think useful information may be obtained. Provided that no Team Member under the age of 18 years may be questioned without the presence of a parent or guardian. 45.1.2 As soon as Officeworks has reasonable grounds for suspicion that a Team Member has committed a breach they will ask such Team Member whether he or she will agree to be questioned in connection therewith and upon such agreement being forthcoming, they will caution the Team Member before putting to him or her any questions, or further questions, relating to that offence. 45.1.3 The caution will be in the following terms: “You are not obliged to say anything unless you wish to do so but what you say may be put into writing and given in evidence”. 45.1.4 After the above caution, Officeworks will then bring to the Team Member’s attention the right under these guidelines to ask for the attendance of a nominated Team Member who is immediately available to be present as a witness during the course of the interview. 45.1.5 Officeworks may object to the presence of any particular person as a witness at such interview if there is reason to believe that the witness may be in some way involved in the subject matter of the interview. The attendance of a Team Member as a witness at a security interview will be on the understanding that the witness will not reveal to any person not involved in the interview what has taken place or been said in the course of such interview. The witness should not interrupt or frustrate the course of the interview. If the witness is the Team Member’s representative he or she will be permitted to speak on the Team Member’s behalf at all times. 45.1.6 During the course of any such interview, the Officeworks representative will conduct themselves in a courteous manner toward the Team Member being interviewed. 45.1.7 Where an investigation involves a Team Member remaining at the Company’s premises, or elsewhere at the Company’s direction, and with the agreement of the Team Member outside of the Team Member’s direction, and with the agreement of the Team Member outside of the Team Member’s ordinary working time, such Team Members will be paid overtime, in accordance with the Agreement, for all time so spent. 45.1.8 As a general principle Tea...
GUIDELINES CONCERNING SECURITY PROCEDURES. The following guidelines are designed to deal with situations where security measures are taken by Xxxxx Xxxxx concerning a staff member suspected of dishonest practices. They should be honoured in the spirit rather than in the letter. They should have application in normal situations but if abnormal situations arise making it impossible for them to be adhered to, the Union will accept, in place of the guidelines, such protective measures as are within the spirit of the guidelines but which may not be embraced within their written terms. The guidelines have no relevance to the questioning of staff in the ordinary course of employment concerning security matters unconnected with any liability by a staff member whose assistance is being sought by the security personnel.
GUIDELINES CONCERNING SECURITY PROCEDURES. The Company will honour the terms of the Retail Security Guidelines as set out below.
GUIDELINES CONCERNING SECURITY PROCEDURES. Team Member interviews
GUIDELINES CONCERNING SECURITY PROCEDURES 

Related to GUIDELINES CONCERNING SECURITY PROCEDURES

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Indemnity Procedures Promptly after receipt by an Indemnified Party of any claim or notice of the commencement of any action or administrative or legal proceeding or investigation as to which the indemnity provided for in Article 18.1 may apply, the Indemnified Party shall notify the Indemnifying Party of such fact. Any failure of or delay in such notification shall not affect a Party’s indemnification obligation unless such failure or delay is materially prejudicial to the Indemnifying Party. Except as stated below, the Indemnifying Party shall have the right to assume the defense thereof with counsel designated by such Indemnifying Party and reasonably satisfactory to the Indemnified Party. If the defendants in any such action include one or more Indemnified Parties and the Indemnifying Party and if the Indemnified Party reasonably concludes that there may be legal defenses available to it and/or other Indemnified Parties which are different from or additional to those available to the Indemnifying Party, the Indemnified Party shall have the right to select separate counsel to assert such legal defenses and to otherwise participate in the defense of such action on its own behalf. In such instances, the Indemnifying Party shall only be required to pay the fees and expenses of one additional attorney to represent an Indemnified Party or Indemnified Parties having such differing or additional legal defenses. The Indemnified Party shall be entitled, at its expense, to participate in any such action, suit or proceeding, the defense of which has been assumed by the Indemnifying Party. Notwithstanding the foregoing, the Indemnifying Party (i) shall not be entitled to assume and control the defense of any such action, suit or proceedings if and to the extent that, in the opinion of the Indemnified Party and its counsel, such action, suit or proceeding involves the potential imposition of criminal liability on the Indemnified Party, or there exists a conflict or adversity of interest between the Indemnified Party and the Indemnifying Party, in such event the Indemnifying Party shall pay the reasonable expenses of the Indemnified Party, and (ii) shall not settle or consent to the entry of any judgment in any action, suit or proceeding without the consent of the Indemnified Party, which shall not be unreasonably withheld, conditioned or delayed.

  • Billing Procedures The Supporting Party will xxxx the Protecting Party for actual costs incurred for Assistance by Hire. Reimbursements will be limited to the provisions of the Agreement and the applicable OP, regardless of whether or not it is authorized on the Resource Order or other documentation produced by the incident. Reimbursable costs may include transportation, salary, overtime, per diem and other approved expenses of Supporting agency personnel. Rates and conditions of use for the equipment and personnel are documented in the OP. Parties shall submit a xxxx within 90 days of the incident. Parties must use their own invoice form for billing under this Agreement to avoid any confusion with other services that may have been ordered under other agreements. Invoices must identify Supporting Party’s name, address, and Taxpayer Identification Number (Department only), fire name, order and request number, and xxxx number and amount. Invoice supporting documentation must include description of services performed, period of services performed, and any applicable cost share agreements. Supporting documentation will itemize details of billing, listing personnel, equipment, travel and per diem, aircraft, supplies and purchases as approved in the attached AOP. It will also include itemized deductions for maintenance and repair of equipment. Department invoices will include “Record of Activities” (FSLA-5) and U.S. Forest Service invoices will include transaction register. Invoices for services under this agreement must be sent to: Name: Xxxx Xxxxxx-Xxxxx, ECC Manager Address: 0000 Xxxxxxxxx Xxxxx Xxxx, Xxxxx, Xxx: Xxxxxxxxxx, XX 00000 Telephone: (000) 000-0000 FAX: (000) 000-0000 Email: xxxxxxxxxxxx@xx.xxx.xx Name: Spalding Community Service District Address: 000-000 Xxxxxxxx Xxx Xxxx, Xxxxx, Xxx: Xxxxxxxxxx, XX 00000 Telephone: (000) 000-0000 FAX: (000) 000-0000 Email: xxxxxxxxxxxxx@xxxxxxx.xxx All bills will have a payment due date 30 days upon receipt. Contested Xxxxxxxx: Written notice that a xxxx is contested will be mailed to the Party within 30 days of receipt of the invoice and will fully explain the contested items. Contested items should be resolved no later than 60 days following receipt of the written notice. Parties are responsible for facilitating resolution of contested xxxxxxxx. Billing requirements and rates are documented in the attached OP.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!