Opening up Procedures Sample Clauses

Opening up Procedures. Unlock door, push open glass door, and pass through door opposite and turn left down corridor. Turn off alarm by putting fob over “proxy” • Unlock office door • Collect key for shutters (pink tag), automatic door (red tag) and RFID kiosk (green tag). These will be in an envelope marked volunteers on top of the key safe in the office. • Unlock shutters. Access children’s library via interview room (unlocks with master key). Lock to main library shutters is between automatic door and wooden doors. • Turn on lights. Switches are near door. Hold down while light increases. • Turn on RFID, close and lock door • Turn on public computers by pressing the button on the hard drive and the button on the bottom right of the monitor. • Lock office door • Check phone is logged on • New newspapers onto rack and remove old ones • Open wooden doors and fasten them open. • Open automatic door with key. 1st position on left = not on automatic • 2nd position – ignore • 3rd position = door opens and closes on sensor / push button • 4th position = door remains open • Please do not leave keys in their locks, store them in the middle drawer under the till Close-down Procedures • Close automatic door and outer wooden door. • Windows – check all are closed including upstairs. Doors to classrooms should be locked. • Back door – please ensure back door is firmly closed. • Netloan – turn off People’s network computers and monitors. • People Counter (located at front door) – Check and record on form on blue clipboard under counter. • Close shutters for Children’s Library. Come out of interview room and lock door. • RFID – press “Borrow items” button, scan the admin card and press the red button in the bottom right hand corner of the screen. The message will appear “this will shut down the kiosk” so select “yes”. When it says “it is safe to turn off the computer” switch it off at the rocker switch bottom right hand of the machine. • Close shutters. • Keys for RFID kiosk, shutters and automatic door should all go in the envelope marked “volunteers” and be left on the key safe in the office. • Lock office door. • Set alarm with fob over “proxy” then press “Yes” • Leave building via front door and lock with key – double turn. Annex 2 Use of Self-Service Machine Intellident self-issue machine General This is an introduction and basic instructions. There are also notes and a user guide from the supplier. Training will also be given onsite with top-ups when requested. Contacts For general non...
AutoNDA by SimpleDocs

Related to Opening up Procedures

  • AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • Hearing Procedures The hearing shall be conducted to preserve its privacy and to allow reasonable procedural due process. Rules of evidence need not be strictly followed, and the hearing shall be streamlined as follows:

  • Billing Procedures (a) PROVIDER agrees all claims shall be submitted to OHCA in a format acceptable to OHCA and in accordance with the OHCA Provider Manual.

  • RECOVERY PROCEDURES The nature and severity of any disaster will influence the recovery procedures. One crucial factor in determining how BellSouth will proceed with restoration is whether or not BellSouth's equipment is incapacitated. Regardless of who's equipment is out of service, BellSouth will move as quickly as possible to aid with service recovery; however, the approach that will be taken may differ depending upon the location of the problem.

  • Review Procedures The Parties agree to jointly conduct a review, sampling transactions of the incidents managed under this Agreement. Findings that are inconsistent with the normal or accepted way of doing business will be reconciled on a case by case basis. Any decision to further examine records will be considered on a case by case basis and appropriate follow up action agreed upon by all agencies involved. Payment for Protection Services (use if appropriate) Geographic, Statewide or Sub-Geographic (local) operating plans and procurement documents or agreement will establish billing procedures for Fee Basis Protection Services.

  • SAFETY PROCEDURES The Contractor shall:

  • AUDIT REVIEW PROCEDURES A. Any dispute concerning a question of fact arising under an interim or post audit of this AGREEMENT that is not disposed of by AGREEMENT, shall be reviewed by LOCAL AGENCY’S Chief Financial Officer.

  • BIDDING PROCEDURES 4.1. Bidders have to login at EHSAN AUCTIONEERS SDN. BHD. Website using the same registered email 30 minute before Auction Time.

  • ORDERING PROCEDURES 6.1 If the Authority or any Other Contracting Body decides to source the Services through this Services Framework then each Contracting Body shall be entitled at any time, during the Term to place an order for the Services from the Supplier by serving an Order in accordance with Framework Agreement Schedule 5 (Ordering Procedure).

Time is Money Join Law Insider Premium to draft better contracts faster.