Patterns of Sick Time Use That Suggest Abuse Sample Clauses

Patterns of Sick Time Use That Suggest Abuse. SHARE and UMass Memorial agree that employees should use sick time only for health-related reasons. Employees should not use sick time because of inclement weather (see Severe Weather policy) or to extend scheduled absences. Some potential examples of a recurring pattern include but are not limited to: calling out on a holiday scheduled to work; calling out before/after holiday off; calling out on weekend shift(s) scheduled to work; calling out before/after weekend off; extending a scheduled vacation by calling out before/after; calling out on a scheduled shift previously requested off. Patterns of sick time use that suggest such abuse of sick time are subject to the disciplinary process.
AutoNDA by SimpleDocs
Patterns of Sick Time Use That Suggest Abuse. SHARE and Marlborough Hospital agree that employees should use sick time only for health-related reasons. Employees should not use sick time because of inclement weather (see Severe/Inclement Weather, pg. 42) or to extend scheduled absences. Some potential examples of a recurring pattern include but are not limited to: calling out on a holiday scheduled to work; calling out before/after holiday off; calling out on weekend shift(s) scheduled to work; calling out before/after weekend off; extending a scheduled vacation by calling out before/after; calling out on a scheduled shift previously requested off. Patterns of sick time use that suggest such abuse of sick time are subject to the disciplinary process.
Patterns of Sick Time Use That Suggest Abuse. SHARE and UMass Memorial agree that employees should use sick time only for health-related reasons. Employees should not use sick time because of inclement weather (see Severe Weather policy) or to extend scheduled absences. Patterns of sick time use that suggest such abuse of sick time are subject to the disciplinary process.

Related to Patterns of Sick Time Use That Suggest Abuse

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Overtime Meals When employees are required to work more than two (2) hours beyond their regular work days, the Employer will provide hot meals at no cost to the employees, up to a maximum of sixteen dollars ($16.00) (receipts to be submitted) plus paid meal periods of one-half (1/2) hour at the prevailing rate and thereafter at four (4) hour intervals. Any early morning start before regular starting time is entitled to a paid meal. The breakfast limit is thirteen dollars ($13.00) (receipts to be submitted). Employees called out on overtime shall be paid for meals as above, after four (4) hours work.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Supplier Diversity Seller shall comply with Xxxxx’s Supplier Diversity Program in accordance with Appendix V.

  • Elements Unsatisfactory Needs Improvement Proficient Exemplary IV-A-1. Reflective Practice Demonstrates limited reflection on practice and/or use of insights gained to improve practice. May reflect on the effectiveness of lessons/ units and interactions with students but not with colleagues and/or rarely uses insights to improve practice. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues, and uses insights gained to improve practice and student learning. Regularly reflects on the effectiveness of lessons, units, and interactions with students, both individually and with colleagues; and uses and shares with colleagues, insights gained to improve practice and student learning. Is able to model this element.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Lobbying Activities - Standard Form - LLL No response Do not upload this form unless Vendor has reportable lobbying activities. There are Attributes entitled, “2 CFR Part 200 or Federal Provision - Xxxx Anti-Lobbying Amendment – Continued.” Properly respond to those Attributes and only upload this form if applicable/instructed. If upload is required based on your response to those Attributes, the Disclosure of Lobbying Activities – Standard Form - LLL must be downloaded from the “Attachments” section of the IonWave eBid System, reviewed, properly completed, and uploaded to this location.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!