Job Security Protection Sample Clauses

Job Security Protection the Company agrees that it will not layoff, involuntarily downgrade or involuntarily terminate the employment of an active Covered Employee, other than for “just cause” under and subject to the terms of the acquired 2012 CWA/AT&T-East collective bargaining agreement applicable to those employees (“2012 CBA”). The Company agrees that if there is a need to declare a surplus of any employee covered by Article VII of the Basic (“core”) Contract, the Company will follow the “has jobs available” path outlined in Article VII 1a of the CBA. The “just cause” requirement does not apply to a Covered Employee who is on a Trial Period or Probationary status under the applicable terms of the CBA.
AutoNDA by SimpleDocs

Related to Job Security Protection

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Liability Protection Whenever an action or proceeding for damages is filed against any Bargaining Unit employee arising from his/her act or omission while performing his/her official duties, such employee(s) may request that the Attorney General defend the action or proceeding at the expense of the state. If the Attorney General determines that the employee was acting in good faith and within the course of his or her official duties, the Attorney General will defend the employee. If the body presiding over the action determines that the employee was acting within the scope of his or her official duties and enters a judgment against the employee, the judgment will be satisfied by the state.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Identity Protection Law Grantee must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-646A.628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600 – 628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but in any event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps Grantee will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines notice required of any such Breach to any individual(s) or entity(ies), Agency will have sole control over the timing, content, and method of such notice, subject to Grantee’s obligations under applicable law.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Foot Protection The Employer reserves the right to require the wearing of foot protection by employees. In such cases, the Employer will provide a safety device or, if the Employer requires the employee to purchase approved safety shoes, the Employer will pay an allowance, not to exceed the established contract price approved by the State Purchasing Division, during January of each year.

  • Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

  • Job Protection 15.9.1 Subject to 15.10 below, an employee returning from parental leave is entitled to resume work in the same position or a similar position to the one they occupied at the time of commencing parental leave. A similar position means a position:

Time is Money Join Law Insider Premium to draft better contracts faster.