Workloads The parties agree to the following provisions relating to faculty members' workload. (a) The registration limits for all courses currently offered by the Employer in the academic, career and technology areas are 35 unless established by practice as lower, excepting multiple sections where the limit is the correct multiple of the number of sections involved. (b) The registration limits for English are as follows: (i) Writing and Composition Courses - 25 (ii) Writing Skills -17 (iii) Creative Writing - 22
Elevation Elevation is defined as restoring an employee to the higher classification, with permanent status, which was held prior to being granted a demotion or to a class that is between the current class and the class from which the employee was demoted. Upon elevation, an employee’s salary will be determined in the same manner that is provided for promotion in Section 43.5, above.
Workload An employee who believes that her workload is unsafe or consistently excessive shall discuss the problem with her immediate supervisor. If the problem is not resolved in this discussion, the employee may seek a remedy by means of the grievance procedure. If the matter is not resolved in the grievance procedure, it may be referred to troubleshooter who shall: a) investigate the difference; b) define the issue in the difference; and c) make written recommendations to resolve the differences.
Classroom Management The certificated classroom teacher demonstrates in his/her performance a competent level of knowledge and skill in organizing the physical and human elements in the educational setting.
Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.
Scaling “Scaling,” as used herein, involves:
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:
Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.