Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.
– SENIORITY AND JOB SECURITY 9.01 (a) Seniority and service for full-time employees shall be defined as the length of continuous service with the Home since the date of last hire, subject to Article 9.03-9.05, 9.17, 9.18 and 11.10 and any other related provision of the Collective Agreement.
Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.
SENIORITY AND LAYOFFS 11.01 Seniority of employees shall be recognized within their respective trade and job classifications. New employees shall be placed on the seniority list at the end of their probationary period and their respective seniority shall be dated back to the date of beginning of employment. 11.02 Seniority lists, the accuracy of which has been agreed to on behalf of the Union in writing shall be maintained at all times by the Employer and shall be available to the Union for inspection to the extent reasonably necessary for the Union to ascertain the seniority status of an employee within its jurisdiction. 11.03 An employee shall lose his seniority and shall be deemed to have quit for any of the following reasons: a. if the employee voluntarily quits his employment; b. if the employee is discharged for a just cause and the discharge is not reversed through the grievance procedure; c. for failure to report to work following a layoff pursuant to the terms of Article 11.07; d. is absent from work for three (3) consecutive working days without notifying the Employer, unless a reason satisfactory to the Employer is given; e. is absent due to layoff or long-term disability, or both, which absence continues for more than six (6) months, except in the event that the employee is on Workers' Compensation and in the event of sickness when the employee has submitted satisfactory evidence of illness, in which cases a period of two (2) years shall apply; f. if the employee fails to report for work upon the termination of an authorized leave of absence, unless a reason satisfactory to the Employer is given, and is discharged as a result thereof, which discharge is not reversed through the grievance and arbitration procedure herein; g. if an employee utilizes a leave of absence for purposes other than those for which the leave of absence was granted. 11.04 When a reduction of the workforce is inevitable, probationary employees shall be laid off first. If further reductions are necessary, the Employer shall determine the order of layoff in consultation with the union and in doing so, they shall be guided by the following considerations: a. seniority standings of the employees; b. ability of the employees to perform the work. It is understood and agreed that no employee will be laid off if there is a fellow employee (or employees) of comparable seniority who is still entitled to vacation. In such a case the latter may be required to take up any remaining vacation to which he is entitled before others will be laid off. 11.05 The Employer shall give one (1) week's notice to the employees of the need for a layoff. 11.06 Any appeal in regard to a layoff must be taken up under the first step of the grievance procedure hereinafter set forth within five (5) workdays after the layoff took place. 11.07 Any employee laid off and recalled for work must return within one (1) workday when unemployed and within seven (7) workdays when employed elsewhere after being recalled, or make definite arrangements with the Employer to return. 11.08 Employees who terminate their employment or are laid off and who are re-hired or return to work within eighteen
SENIORITY AND LAYOFF The first twelve (12) months of continuous employment starting from the date of employment shall constitute a new employee’s probationary period. At the three (3) month point in the probationary period, the DPW Director (for the DPW employees) and the Town Administrator (for the Custodian employees) will meet with the employee for an evaluation in order to inform him/her of any problems with job performance and corrections that need to be made. If the DPW Director or the Town Administrator determines that within or at the end of the twelve (12) month period that the employee is not performing their duties, then said employee can be discharged from said position without recourse from the Union (not subject to the grievance procedure). An employee shall acquire seniority after completing the twelve (12) month probationary period and his/her seniority will revert to the beginning date of employment. During the twelve (12) month probationary period said employee shall be entitled to and receive all the benefits of the Collective Bargaining Agreement as practiced in the past. An employee's full time continuous service with the Town of Pembroke ("Town-wide" seniority) shall determine the employee's seniority for purposes of layoff and recall under this article. Overall seniority will be considered in cases of transfers. Overall seniority within each Division will be considered in preference in choice of vacation periods. In the event that the DPW Director needs to transfer employees from one Division to another, the transfer notification will be posted on the Union Board. The transfer will start with the least senior employee in the Division effected unless a senior employee in the Division requests the transfer in writing. If the Town finds it necessary to lay off employees, the procedures set forth in this article will apply. The employer shall meet with the Union to discuss any impending layoffs at least thirty (30) days prior to such layoff. A "layoff" is hereby defined as a complete termination of employment for economic or other legitimate non-disciplinary reasons. If a layoff is necessary, the Town shall layoff by job classification first, then by seniority, starting with the least senior employee. In all cases, seniority shall be measured by Town-wide service as defined above and not by departmental service. If it is the Highway, Tree, Cemetery budget that is affected by the layoff, the least senior employee will have the right to bump a lesser senior employee in the Water Division. If it is the Water budget that is affected, the least senior employee will have the right to bump a lesser senior employee in the Highway, Tree or Cemetery Division. In the case of the Custodian Classification, if a layoff is necessary, the Town shall layoff in the order of starting with the least senior employee within the Custodian classification. An employee in the Custodian classification will not be permitted to bump any employee within any of the other DPW Divisions. In the event of a layoff, the Custodians shall not be eligible to bump into any other division of the DPW, meaning the Water, Highway, or Cemetery/Tree Divisions. In rehiring in any job classification the Town will offer re-employment to these former employees who have been laid off in the inverse order in which said employees were laid off. There shall be no obligation to offer re-employment to any employee who has been laid off more than three (3) years. The offer of re-employment shall be sufficient if made by certified or registered mail addressed to the laid off employee at his last address of record, as shown by the records of the town. Any such laid off employee must respond and be available for re-employment within seventeen (17) days from the date of mailing of the offer; otherwise the laid off employee shall be deemed to have refused re-employment and the Town's obligation under this article is satisfied.
Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.
Data Security and Privacy Plan As more fully described herein, throughout the term of the Subscription Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Subscription Agreement are as follows: (a) Vendor will implement all state, federal, and local data security and privacy requirements including those contained within the Subscription Agreement and this Data Sharing and Confidentiality Agreement, consistent with the District’s data security and privacy policy. (b) Vendor will have specific administrative, operational and technical safeguards and practices in place to protect Protected Data that it receives from the District under the Subscription Agreement. (c) Vendor will comply with all obligations contained within the section set forth in this Exhibit below entitled “Supplemental Information about a Subscription Agreement between [Xxxxx-Fultonville Central School District] and [Vendor Name].” Vendor’s obligations described within this section include, but are not limited to: (i) its obligation to require subcontractors or other authorized persons or entities to whom it may disclose Protected Data (if any) to execute written agreements acknowledging that the data protection obligations imposed on Vendor by state and federal law and the Subscription Agreement shall apply to the subcontractor, and (ii) its obligation to follow certain procedures for the return, transition, deletion and/or destruction of Protected Data upon termination, expiration or assignment (to the extent authorized) of the Subscription Agreement. (d) Vendor has provided or will provide training on the federal and state laws governing confidentiality of Protected Data for any of its officers or employees (or officers or employees of any of its subcontractors or assignees) who will have access to Protected Data, prior to their receiving access. (e) Vendor will manage data security and privacy incidents that implicate Protected Data and will develop and implement plans to identify breaches and unauthorized disclosures. Vendor will provide prompt notification to the District of any breaches or unauthorized disclosures of Protected Data in accordance with the provisions of Section 5 of this Data Sharing and Confidentiality Agreement.
Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.
Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.
Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.