First Aid Training In the interests of the occupational safety and health of employees, the Employer will undertake an in-service program of first aid training aimed at providing a first aid officer for each department.
Technical Training The CAISO and the Participating TOs shall respond to reasonable requests for support and provide relevant technical training to each other’s employees to support the safe, reliable, and efficient operation of the CAISO Controlled Grid and to comply with any NERC or WECC operator certification or training requirements. Examples of such technical training include, but are not limited to: (1) the theory or operation of new or modified equipment (e.g., control systems, Remedial Action Schemes, protective relays); (2) computer and applicator programs; and (3) CAISO (or Participating TO) requirements. The Parties shall enter into agreements regarding the timing, term, locations, and cost allocation for the training.
Trainings Appointment of any length involving two (2) or more Consumers who might need to split up to join different trainings, group discussions, etc.
Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 ARTICLE VII BLV/BLVI TRAFFIC 16 7.1 Busy Line Verification 16 7.2 Busy Line Verification Interrupt 16 7.3 BLV/BLVI Traffic 16 7.4 BLV/BLVI Compensation 16
Orientation and Training A transferring employee will be orientated separately to both or their new home in accordance with Article 20 the collective agreement of the designated employer.
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Job Training The Employer and the Union shall establish a Joint Committee on Training and Skill Upgrading for the following purposes: (1) for planning training programs for those employees affected by technological change; (2) for planning training programs to enable employees to qualify for new positions being planned through future expansion or renovation; (3) for planning training programs for those employees affected by new methods of operation; (4) for planning training programs in the area of general skill upgrading. Whenever necessary, this Committee shall seek the assistance of external training resources such as the Federal Human Resources Development Canada and Provincial Ministry of Labour, or other recognized training institutions.
Customer Support and Training System Agency will provide support for the CMBHS, including problem tracking and problem resolution. System Agency will provide telephone numbers for Grantees to obtain access to expert assistance for CMBHS-related problem resolution. System Agency will provide initial CMBHS training. Grantee shall provide subsequent ongoing end-user training.
Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.