Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.
CONFIDENTIALITY AND PRIVACY POLICIES AND LAWS The Contractor shall comply to the extent applicable with all State and Authorized User policies regarding compliance with various confidentiality and privacy laws, rules and regulations, including but not limited to the IRS Publication 1075, Family Educational Rights and Privacy Act (FERPA), the Health Insurance and Portability Act of 1996 (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). Contractor shall cooperate in executing a written confidentiality agreement under FERPA and/or a Business Associate Agreement (HIPAA/HITECH) or other contractual provisions upon request by the State or any Authorized User.
Policies and Regulations 34 In addition to the Federal Acquisition Regulation (FAR) clauses referred to 35 and listed herein of this Request for Proposal (RFP), the contractor shall 36 comply with the Federal Regulations, Acts, Executive Orders, Special 37 Publications, Guidelines, NOAA Directives and Policies and standards listed 38 below. This listing is not all-inclusive and is not intended to relieve the 39 contractor of its responsibilities for identification of applicable statutes, 40 regulations and procedures and compliance therewith, when performing work 41 under this SOW. 42 Xxxxxxxx-Xxxxxxx Xxxxxxx, Management, and Conservation Act (MSA) 43 Marine Mammal Protection Act (MMPA) 44 Endangered Species Act (ESA) 45 Data Quality Control Act (P.L. 106-514) 46 Information Technology Security Policy 47 Fisheries Management Plans (FMP) 48 Biological Opinions (BO) 49 Take Reduction Team (TRT) 50 NOAA Safety Standards 1 Fair Labor Standards Act (FLSA) 2 Service Contract Act (SCA) 3 Department of Labor Wage Determinations 4 Applicable Federal and State labor laws 5 At-Sea Monitor Health and Safety regulations 6 Federal, state, and local safety regulations 7 Merchant Marine Act (Xxxxx Act) and General Maritime Law 8 U.S. Xxxxxxxxx and Harbor Worker’s Compensation Act
All Policies Requirements DocuSign Envelope ID: 164A89AC-25BB-40A0-B637-8ED7CE9DD107
Compliance with Texas Privacy Laws and Regulations In performing their respective obligations under the Agreement, the LEA and the Provider shall comply with all Texas laws and regulations pertaining to LEA data privacy and confidentiality, including but not limited to the Texas Education Code Chapter 32, and Texas Government Code Chapter 560.
Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.
Compliance with Federal Law, Regulations, and Executive Orders This is an acknowledgement that FEMA financial assistance will be used to fund the contract only. The contractor will comply will all applicable federal law, regulations, executive orders, FEMA policies, procedures, and directives.
Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.
Compliance with Data Protection Laws Data Controller shall comply with all of its obligations under Data Protection Laws when Processing Personal Data.
SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.