Law Librarians Sample Clauses

Law Librarians. The administrative evaluation of Law Librarians shall be conducted by the bargaining unit member's supervisor as it has in the past. T wo (2) m anagem ent re p res e nt a t i v es a nd t w o (2 ) members of the bargaining unit in the Law Library appointed by the Union shall explore the possibility of including peer review in the total evaluation process for Law Librarians if requested by either the University or the Union.
AutoNDA by SimpleDocs

Related to Law Librarians

  • Librarians The normal work week for librarians is 35 hours per week. The maximum for reference desk coverage is 20 hours per week. Individual faculty members may elect to exceed this maximum. Where librarians are involved in instructional modes listed in Article 12.03, these shall be pro-rated. For part-time regular and non-regular type 2 librarians, part of their assignment shall be scheduled as non reference desk duties as agreed upon by the librarian and the administrator responsible. Scheduling work shall follow past practices and shall be delivered in cooperation with the administrator responsible.

  • Library Borrowing privileges available without charge. Upon retirement an employee shall be issued a permanent individual library card.

  • Technical Interfaces 3.2.6.1 The Interconnection facilities provided by each Party shall be formatted using either Alternate Xxxx Inversion (AMI) line code with Superframe format framing or Bipolar 8-Zero Substitution with Extended Superframe (B8ZS ESF) format framing or any mutually agreeable line coding and framing.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Programming Processor is not responsible for programming or reprogramming of fuel dispensers.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Users There is no limit to the number of users who can access the Software. You can invite any person You wish to access the Software.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!