Pickup and Drop-off Sample Clauses

Pickup and Drop-off. Unless other arrangements are made, the non-custodial parent shall pick up the children at the times specified and return them at the times specified. The custodial parent shall have the children ready for visitation at the time they are to be picked up and shall be present at the home to receive the children at the time they are returned. Unjustified violations of this provision may result in the offender being subject to contempt of court. (Commentary: While it is most desirable for the parents to pick up and return the children, this provision does not prohibit grandparents, current spouses or other appropriate adults known to the children.)
AutoNDA by SimpleDocs

Related to Pickup and Drop-off

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Directory Listing and Directory Distribution 41 5. Voice Information Service Traffic 43 6. Intercept and Referral Announcements 44 7. Originating Line Number Screening (OLNS) 44 8. Operations Support Systems (OSS) Services 44 9. Poles, Ducts, Conduits and Xxxxxx-xx-Xxx 00 00. Telephone Numbers 51 11. Routing for Operator Services and Directory Assistance Traffic 51 12. Unauthorized Carrier Change Charges 52 13. Good Faith Performance 52 INTERCONNECTION ATTACHMENT. 53 1. General 53 2. Points of Interconnection and Trunk Types 53 3. Alternative Interconnection Arrangements 57 4. Initiating Interconnection 58 5. Transmission and Routing of Telephone Exchange Service Traffic 59

  • LEAST RESTRICTIVE ENVIRONMENT/DUAL ENROLLMENT CONTRACTOR and XXX shall follow all LEA policies and procedures that support Least Restrictive Environment (“LRE”) options and/or dual enrollment options if available and appropriate, for students to have access to the general curriculum and to be educated with their nondisabled peers to the maximum extent appropriate. CONTRACTOR and XXX shall ensure that LRE placement options are addressed at all IEP team meetings regarding students for whom ISAs have been or may be executed. This shall include IEP team consideration of supplementary aids and services, goals and objectives necessary for placement in the LRE and necessary to enable students to transition to less restrictive settings. When an IEP team has determined that a student should be transitioned into the public school setting, CONTRACTOR shall assist the LEA in implementing the IEP team’s recommended activities to support the transition.

  • Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.

  • citizens abroad Unless the circumstances described in the parenthetical in paragraph 1 above are applicable, either (a) at the time the buy order was originated, the buyer was outside the United States or we and any person acting on our behalf reasonably believed that the buyer was outside the United States or (b) the transaction was executed in, on or through the facilities of a designated offshore securities market, and neither we nor any person acting on our behalf knows that the transaction was pre-arranged with a buyer in the United States.

  • Unbundled Digital Loops 2.3.1 BellSouth will offer Unbundled Digital Loops (UDL). UDLs are service specific, will be designed, will be provisioned with test points (where appropriate), and will come standard with OC and a DLR. The various UDLs are intended to support a specific digital transmission scheme or service. 2.3.2 BellSouth shall make available the following UDLs, subject to restrictions set forth herein:

  • Description of Vendor Entity and Vendor's Goods & Services If awarded, this description of Vendor and Vendor's goods and services will appear on the TIPS website for customer/public viewing. Technology solutions value-added reseller and installer of all things technology. Please identify the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxx Xxxxxxx Primary Contact Title VP of Sales Please enter a valid email address that will definitely reach the Primary Contact. xxxx@xxxxxxxxxx.xxx Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). Please provide the accurate and current phone number where the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract can be reached directly. 0000000000 Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 0000000000 Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 0000000000

  • Xxxxxxxx Tobacco Co [Xxxxx Progeny] Circuit Court, Levy County, (Bronson, FL) $8 million in compensatory damages; 90% of fault assigned to RJR Tobacco, which reduced the award to $7.2 million; $72 million in punitive damages. See “— Xxxxx and Xxxxx Progeny Cases” below.

  • State of California Public Liability and Workers’ Compensation Program A. The Judicial Council has elected to be self-insured for its motor vehicle, aircraft liability and general liability exposures. B. The Judicial Council administers workers’ compensation benefits for its employees through a Third Party agreement.

  • Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!