Identification of Personnel Sample Clauses

Identification of Personnel. The Contractor shall furnish each Personnel with a means of identifying themselves as agents, Subcontractors, or employees of the Contractor assigned to perform Services under the Contract, and furnish the State with security credentials on these Personnel.
AutoNDA by SimpleDocs
Identification of Personnel. CATERER shall provide appropriate identification of its agents, employees, and representatives during the performance of this Agreement at the MGCC as agreed upon between BOARD and CATERER. XXXXXXX acknowledges and recognizes that it is a fair and equal opportunity employer and that its employees, representative, and agents have had training in sexual harassment, gender sensitivity, and cultural diversity. The CATERER shall not schedule to the MGCC any person, whether as a substitute or on a temporary basis, who has a criminal conviction, which directly relates to his/her position of employment (assignment) such as theft, any sex offense, assault, possession of stolen property. The CATERER, prior to the assignment of any person to the MGCC, shall complete a background investigation including a criminal record investigation, regarding each such person. The criminal investigation must be kept current and/or updated for each employee during the duration of this contract and provided upon the request of the MGCC Manager or designee.
Identification of Personnel. SECURITY Required Background Checks Permanent Disqualification: 1. Registered sex offenders are ineligible. 2. Espionage or conspiracy to commit espionage. 3. Sedition or conspiracy to commit sedition. 4. Treason or conspiracy to commit treason. 5. A federal crime of terrorism as defined in 18 U.S.C. 2332b(g), or comparable State law, or conspiracy to commit such crime. 6. A crime involving a TSI (transportation security incident). Note: A transportation security incident is a security incident resulting in a significant loss of life, environmental damage, transportation system disruption, or economic disruption in a particular area, as defined in 46 U.S.C. 70101. The term “economic disruption” does not include a work stoppage or other employee-related action not related to terrorism and resulting from an employer- employee dispute.
Identification of Personnel. Ventiv shall provide Iroko with a list of all individuals who will provide Services and provide periodic updates of the list as reasonably requested by Iroko. An e-mail address and phone number for each individual must be provided.
Identification of Personnel. 1. CATERER shall provide appropriate identification of all of its agents, employees, and representatives during the performance of this Agreement at the CAC as agreed upon between the City and CATERER. 2. CATERER represents that it is a fair and equal opportunity employer and that its employees, representative, and agents have had training in sexual harassment, gender sensitivity, and cultural diversity. 3. XXXXXXX, prior to the assignment of any person to the CAC, shall complete a background investigation including a criminal record investigation, regarding each such person. The criminal investigation must be updated every 12 months for each employee during the duration of this Agreement.
Identification of Personnel. The Consultant’s employees and any subcontractors of the Consultant regularly performing Building Services hereunder shall wear a name tag with the logo of the Town in a design and format as reasonably required by the Town when they are performing Services for the Town, except as otherwise directed by the Town Administrator. The Consultant’s employees performing Services hereunder shall, when professionally appropriate, distribute Town-approved business cards referencing the employee’s name which cards shall state “Town of Xxxxx” and shall identify for customers the phone number advertised for the Town’s Building Department. For all Town-related matters, including incoming and outgoing mail, the Consultant shall use the Town’s address as provided in the Notices section below. It is the intent and purpose of this paragraph that the Consultant, although at all times exercising independent judgment and discretion in administering the Town’s policies and recognizing its role as an independent contractor, perform the Building Services in a manner that best represents the Town and displays that the Town has retained professional building services for its citizens.

Related to Identification of Personnel

  • Removal of Personnel The CONSULTANT agrees, within thirty (30) calendar days of receipt of a written request from the COUNTY, to promptly remove and replace the CONSULTANT'S Project Director, or any other personnel employed or retained by the CONSULTANT, or personnel of the sub-consultants or subcontractors engaged by the CONSULTANT to provide and/or perform services and/or work pursuant to the requirements of this Agreement, who the COUNTY shall request, in writing, be removed, which request may be made by the COUNTY with or without cause. However, if day thirty

  • Assignment of Personnel The Contractor shall not substitute any personnel for those specifically named in its proposal unless personnel with substantially equal or better qualifications and experience are provided, acceptable to County, as is evidenced in writing.

  • Types of Personal Data Contact Information, the extent of which is determined and controlled by the Customer in its sole discretion, and other Personal Data such as navigational data (including website usage information), email data, system usage data, application integration data, and other electronic data submitted, stored, sent, or received by end users via the Subscription Service.

  • Entry and Sojourn of Personnel A Contracting Party shall, subject to its laws applicable from time to time relating to the entry and sojourn of non-citizens, permit natural persons of the other Contracting Party and personnel employed by companies of the other Contracting Party to enter and remain in its territory for the purpose of engaging in activities connected with investments.

  • Protection of Personal Data 25.1 The Parties agree that they may obtain and have access to personal data for the duration of the Agreement for the fulfilment of the rights and obligations contained herein. In performing the obligations as set out in this Agreement, the Parties shall at all times ensure that: a) they process data only for the express purpose for which it was obtained; b) once processed for the purposes for which it was obtained, all data will be destroyed to an extent that it cannot be reconstructed to its original form; c) data is provided only to authorised personnel who strictly require the personal data to carry out the Parties’ respective obligations under this Agreement; d) they do not disclose personal data of the other Party, other than in terms of this Agreement; e) they have all reasonable technical and organisational measures in place to protect all personal data from unauthorised access and/or use; f) they have appropriate technical and organisational measures in place to safeguard the security, integrity and authenticity of all data in its possession or under its control in terms of this Agreement; g) such personal data is protected against unauthorised or unlawful processing, accidental loss, destruction or damage, alteration, disclosure or access. 25.2 The Parties agree that if personal data will be processed for additional purposes beyond the original purpose for which it was obtained, explicit consent must be obtained beforehand from those persons whose information will be subject to further processing. 25.3 Should it be necessary for either Party to disclose or otherwise make available the personal data to any third party (including sub-contractors and employees), it may do so only with the prior written permission of the other Party. The Party requiring such permission shall require of all such third parties, appropriate written undertakings to be provided, containing similar terms to that set forth in this clause 25, and dealing with that third party's obligations in respect of its processing of the personal data. Following approval by the other Party, the Party requiring permission agrees that the provisions of this clause 25 shall mutatis mutandis apply to all authorised third parties who process personal data. 25.4 The Parties shall ensure that any persons authorized to process data on their behalf (including employees and third parties) will safeguard the security, integrity and authenticity of all data. Where necessary to meet this requirement, the Parties shall keep all personal data and any analyses, profiles, or documents derived therefrom logically separated from all other data and documentation held by it. 25.5 The Parties shall carry out regular assessments to identify all reasonably foreseeable internal and external risks to the personal data in its possession or under its control. The Parties shall implement and maintain appropriate safeguards against the risks which it identifies and shall also regularly verify that the safeguards which it has in place has been effectively implemented. 25.6 The Parties agree that they will promptly return or destroy any personal data in their possession or control which belongs to the other Party once it no longer serves the purpose for which it was collected in relation to this Agreement, subject to any legal retention requirements. This may be at the request of the other Party and includes circumstances where a person has requested the Parties to delete all instances of their personal data. The information will be destroyed in such a manner that it cannot be reconstructed to its original form, linking it to any particular individual or organisation.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Contents of Personnel File A. Adverse statements prepared by the County shall not be included in an employee's official personnel file unless a copy is provided to the employee. B. An employee shall have the right to inspect and review the contents of his or her official personnel file at reasonable intervals. C. In addition, an employee shall have the right to inspect and review the contents of his or her official personnel file in any case where the employee has a grievance related to performance; to a performance evaluation; or is contesting his or her suspension or discharge from County service. D. Letters of reference and reports concerning criminal investigations concerning the employee shall be excluded from the provisions of B. and C., above. E. An employee shall have the right to respond in writing or personal interview to any information contained in his or her official personnel file, such reply to become a permanent part of such employee's official personnel file. F. Any contents of an employee's official personnel file may be destroyed pursuant to an agreement between the Chief of Employee Relations and the employee concerned or by an order of an arbitrator, court or impartial hearing officer unless the particular item is otherwise required by law to be kept.

  • Categories of Personal Data Data Controller may submit Personal Data to the Subscription Service, the extent of which is solely determined by Data Controller, and may include the following categories: • communication data (e.g. telephone, email); • business and personal contact details; and • other Personal Data submitted to the Subscription Service.

  • Employment of Personnel Manager shall use its diligent efforts to investigate, hire, pay, supervise and discharge the personnel necessary to be employed by it to properly maintain, operate and lease the Property, including without limitation a property manager or business manager at the Property. Such personnel shall in every instance be deemed agents or employees, as the case may be, of Manager. Owner has no right of supervision or direction of agents or employees of Manager whatsoever; however, Owner shall have the right to require the reassignment or termination of any employee. All Owner directives shall be communicated to Manager’s senior level management employees. Manager and all personnel of Manager who handle or who are responsible for handling Owner’s monies shall be bonded in favor of Owner. Manager agrees to obtain and keep in effect fidelity insurance in an amount not less than Two Hundred Fifty Thousand Dollars ($250,000). All reasonable salaries, wages and other compensation of personnel employed by Manager, including so-called fringe benefits, worker’s compensation, medical and health insurance and the like, shall be deemed to be reimbursable expenses of Manager. Manager may allow its employees who work at the Property and provide services to the Property after normal business hours, to reside at the Property for reduced rents (or rent fee as provided in the Operating Budget) in consideration of their benefit to Owner and the Property, provided such reduced rents are reflected in the Annual Business Plan.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!