Preventive Services All necessary procedures to prevent the occurrence of oral disease, including: Cleaning and scaling Topical application of fluoride Space maintainers
Exclusive Service Employee shall devote his best efforts and full time to rendering services on behalf of the Corporation in furtherance of its best interests. Employee shall comply with all policies, standards and regulations of the Corporation now or hereafter promulgated, and shall perform his duties under this Agreement to the best of his abilities and in accordance with standards of conduct applicable to officers of banks.
Supportive Services 2.1. Case Management Access Shelter Providers are required to have case management available to participants on site. Participation within case management is voluntary to program participants, however all participants must be offered case management and must be engaged on an ongoing basis to encourage participation. Shelter Providers should recognize that it may take multiple contacts before a participant is ready to engage. Shelter Providers must ensure case management services are participant-centered to individual needs. Programs must provide space for the provision of case management that works to create as much privacy and confidentiality as possible.
Exclusive Services Executive shall at all times faithfully, industriously and to the best of his or her ability, experience and talent perform to the satisfaction of the Board and the CEO all of the duties that may be assigned to Executive hereunder and shall devote substantially all of his or her productive time and efforts to the performance of such duties. Subject to the terms of the Employee Confidentiality and Invention Assignment Agreement referred to in Section 5(b), this shall not preclude Executive from devoting time to personal and family investments or serving on community and civic boards, or participating in industry associations, provided such activities do not interfere with his or her duties to the Company, as determined in good faith by the CEO. Executive agrees that he or she will not join any boards, other than community and civic boards (which do not interfere with his or her duties to the Company), without the prior approval of the CEO.
Cloud storage DSHS Confidential Information requires protections equal to or greater than those specified elsewhere within this exhibit. Cloud storage of Data is problematic as neither DSHS nor the Contractor has control of the environment in which the Data is stored. For this reason: (1) DSHS Data will not be stored in any consumer grade Cloud solution, unless all of the following conditions are met: (a) Contractor has written procedures in place governing use of the Cloud storage and Contractor attests in writing that all such procedures will be uniformly followed. (b) The Data will be Encrypted while within the Contractor network. (c) The Data will remain Encrypted during transmission to the Cloud. (d) The Data will remain Encrypted at all times while residing within the Cloud storage solution. (e) The Contractor will possess a decryption key for the Data, and the decryption key will be possessed only by the Contractor and/or DSHS. (f) The Data will not be downloaded to non-authorized systems, meaning systems that are not on either the DSHS or Contractor networks. (g) The Data will not be decrypted until downloaded onto a computer within the control of an Authorized User and within either the DSHS or Contractor’s network. (2) Data will not be stored on an Enterprise Cloud storage solution unless either: (a) The Cloud storage provider is treated as any other Sub-Contractor, and agrees in writing to all of the requirements within this exhibit; or, (b) The Cloud storage solution used is FedRAMP certified. (3) If the Data includes protected health information covered by the Health Insurance Portability and Accountability Act (HIPAA), the Cloud provider must sign a Business Associate Agreement prior to Data being stored in their Cloud solution.
Exit Interview Upon termination of Employee’s employment for any reason, Employee agrees, if requested, to participate in an exit interview with the Company and reaffirm in writing Employee’s post-employment obligations as set forth in this Agreement.
CLOUD SERVICE The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist of the Quotation that is provided and the Proof of Entitlement (XxX) you will receive confirming the start date and term of the Cloud Services and when invoicing will commence.
Non-Exclusive Services The services of the Adviser to the Trust are not deemed exclusive, and the Adviser shall be free to render similar services to others, to the extent that such service does not affect the Adviser’s ability to perform its duties and obligations hereunder.
Verizon OSS Services 8.2.1 Upon request by ECI, Verizon shall provide to ECI Verizon OSS Services. Such Verizon OSS Services will be provided in accordance with, but only to the extent required by, Applicable Law. 8.2.2 Subject to the requirements of Applicable Law, Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services that will be offered by Verizon, shall be as determined by Verizon. Subject to the requirements of Applicable Law, Verizon shall have the right to change Verizon Operations Support Systems, Verizon Operations Support Systems functions, Verizon OSS Facilities, Verizon OSS Information, and the Verizon OSS Services, from time-to-time, without the consent of ECI. 8.2.3 To the extent required by Applicable Law, in providing Verizon OSS Services to ECI, Verizon will comply with Verizon’s applicable OSS Change Management Guidelines, as such Guidelines are modified from time-to-time, including, but not limited to, the provisions of the Guidelines related to furnishing notice of changes in Verizon OSS Services. Verizon’s OSS Change Management Guidelines will be set out on a Verizon website.
Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.