Interceptor System Move Up Pay Sample Clauses

Interceptor System Move Up Pay. In the event Interceptor System Employees who have successfully completed their initial probationary period are temporarily assigned to work in a higher-paid classification for four (4) or more consecutive hours, the following hourly pay premiums shall be paid in addition to the employee’s regular rate for all hours worked in such classification: Serviceworker 1 to Serviceworker 2 $.65 per hour Serviceworker 2 to Lead Worker‌ $1.00 per hour Section C.03 – Interceptor Serviceworker 2/Seasonal The Interceptor Serviceworker 2/Seasonal job classification has been established to staff a sewer maintenance crew during warm weather months. Employees in this classification shall be laid off in the fall season of the year and recalled in the spring season of the year. All terms and conditions of this Agreement apply except the layoff and recall provisions. Layoff at the end of the season will occur for this classification independent of any other layoff occurring within the bargaining unit and no bumping rights have been established for this classification.
AutoNDA by SimpleDocs
Interceptor System Move Up Pay. In the event Interceptor System Employees who have successfully completed their initial probationary period are temporarily assigned to work in a higher-paid classification for four (4) or more consecutive hours, the following hourly pay premiums shall be paid in addition to the employee’s regular rate for all hours worked in such classification: Serviceworker I to Serviceworker II $.65 per hour Serviceworker II to Lead Worker $1.00 per hour

Related to Interceptor System Move Up Pay

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Mail Order Catalog Warnings In the event that, the Settling Entity prints new catalogs and sells units of the Products via mail order through such catalogs to California consumers or through its customers, the Settling Entity shall provide a warning for each unit of such Product both on the label in accordance with subsection 2.4 above, and in the catalog in a manner that clearly associates the warning with the specific Product being purchased. Any warning provided in a mail order catalog shall be in the same type size or larger than other consumer information conveyed for such Product within the catalog and shall be located on the same display page of the item. The catalog warning may use the Short-Form Warning content described in subsection 2.3(b) if the language provided on the Product label also uses the Short-Form Warning.

  • SUBLOOPS 45.1. Sprint will offer unbundled access to copper subloops and subloops for access to multiunit premises wiring. Sprint will consider all requests for access to subloops through the ICB process due to the wide variety of interconnections available and the lack of standards. A written response will be provided to CLEC covering the interconnection time intervals, prices and other information based on the ICB process as set forth in this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.