Workplace Harassment The Hospital and the Union are committed to ensuring a work environment that is free from harassment. Harassment is defined as a “course of vexatious comment or conduct that is known or ought reasonably to be known to be unwelcome”, that denies individual dignity and respect on the basis of the grounds such as gender, disability, race, colour, sexual orientation or other prohibited grounds, as stated in the Ontario Human Rights Code. All employees are expected to treat others with courtesy and consideration and to discourage harassment. ref. Ontario Human Rights Code, Sec. 10(1). Harassment may take many forms including verbal, physical or visual. It may involve a threat, an implied threat or be perceived as a condition of employment. The Parties agree that harassment is in no way to be construed as properly discharged supervisory responsibilities, including the delegation of work assignments and/or the assessment of discipline. If an employee believes that she/he has been harassed and/or discriminated against on the basis of any prohibited ground of discrimination, there are specific actions that may be undertaken. The employee should request the harasser to stop the unwanted behaviour by informing the harassing individual(s) that the behaviour is unwanted and unwelcome. Should the employee not feel comfortable addressing the harasser directly, she/he may request the assistance of the manager or a Union representative. If the unwelcome behaviour was to continue, the employee will consult the Hospital policy on harassment and will be free to pursue all avenues including the complaint investigation and resolution. The Parties agree that an employee may have a representative of the Union with her/him throughout the process, if requested.
Anonymous Material There shall be no anonymous material in the evaluation file except for numerical summaries of student evaluations that are part of a regular evaluation procedure of classroom instruction and/or written comments from students obtained as part of that regular evaluation procedure. If written comments from students in a course are included in the evaluation file, all of the comments obtained in the same course must be included.
Infectious Diseases The Employer and the Union desire to arrest the spread of infectious diseases in the nursing home. To achieve this objective, the Joint Health and Safety Committee may review and offer input into infection control programs and protocols including surveillance, outbreak control, isolation, precautions, worker education and training, and personal protective equipment. The Employer will provide training and ongoing education in communicable disease recognition, use of personal protective equipment, decontamination of equipment, and disposal of hazardous waste.
Substance Abuse The dangers and costs that alcohol and other chemical abuses can create in the electrical contracting industry in terms of safety and productivity are significant. The parties to this Agreement resolve to combat chemical abuse in any form and agree that, to be effective, programs to eliminate substance abuse and impairment should contain a strong rehabilitation component. The local parties recognize that the implementation of a drug and alcohol policy and program must be subject to all applicable federal, state, and local laws and regulations. Such policies and programs must also be administered in accordance with accepted scientific principles, and must incorporate procedural safeguards to ensure fairness in application and protection of legitimate interests of privacy and confidentiality. To provide a drug-free workforce for the Electrical Construction Industry, each IBEW local union and NECA chapter shall implement an area-wide Substance Abuse Testing Policy. The policy shall include minimum standards as required by the IBEW and NECA. Should any of the required minimum standards fail to comply with federal, state, and/or local laws and regulations, they shall be modified by the local union and chapter to meet the requirements of those laws and regulations.
Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.
Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).
FLORIDA CONVICTED/SUSPENDED/DISCRIMINATORY COMPLAINTS By submission of an offer, the respondent affirms that it is not currently listed in the Florida Department of Management Services Convicted/Suspended/Discriminatory Complaint Vendor List.
Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and its respective Subsidiaries may presently have and, after the Effective Time, may gain access to or possession of confidential or proprietary Information of, or personal Information relating to, Third Parties: (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or the other Party’s Subsidiaries, on the other hand, prior to the Effective Time or (ii) that, as between the two parties, was originally collected by the other Party or the other Party’s Subsidiaries and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause its Subsidiaries and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary Information of, or personal Information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or the other Party’s Subsidiaries, on the one hand, and such Third Parties, on the other hand.
ACCESS TO PROTECTED HEALTH INFORMATION 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524. 7.2 If any Individual requests access to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within two (2) days of the receipt of the request. Whether access shall be provided or denied shall be determined by Covered Entity. 7.3 To the extent that Business Associate maintains Protected Health Information that is subject to access as set forth above in one or more Designated Record Sets electronically and if the Individual requests an electronic copy of such information, Business Associate shall provide the Individual with access to the Protected Health Information in the electronic form and format requested by the Individual, if it is readily producible in such form and format; or, if not, in a readable electronic form and format as agreed to by Covered Entity and the Individual.
Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.