APPLICATION AND SCOPE 4.1. All employers and employees within the clothing manufacturing industry, and their respective organisations are encouraged to use this Code to develop, implement and refine their HIV/AIDS policies and programmes to suit the needs of their workplaces.
Construction and Scope of Agreement The language of all parts of this Agreement shall in all cases be construed as a whole, according to its fair meaning, and not strictly for or against any party. This Agreement is the only, sole, entire, and complete agreement of the parties relating in any way to the subject matter hereof. No statements, promises, or representations have been made by any party to any other, or relied upon, and no consideration has been offered or promised, other than as may be expressly provided herein. This Assumption of Risk, Release of Claims, Indemnification, and Hold Harmless and Agreement supersedes any earlier written or oral understandings or agreements between the parties. Participant acknowledges that he/she has read this Assumption of Risk, Release of Claims, Indemnification and Hold Harmless Agreement, understands its meaning and effect, and agrees to be bound by it. Date:
Purpose and Scope (a) The purpose of these standard contractual clauses is to ensure compliance with the requirements of Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)1 for the transfer of personal data to a third country.
Policy and Procedure The school seeks to ensure that internet, mobile and digital technologies are used effectively and safely, for their intended educational purpose, in ways that will not infringe legal requirements or create unnecessary risk. The school expects everyone to use internet, mobile and digital technologies responsibly and strictly according to the conditions set out in this policy. This policy also includes expectations on appropriate online behaviour and use of technology outside of school for pupils, parents/carers, staff and governors and all other visitors to the school. Use of email Staff and governors should use a school email account or Governor Hub for all official school communication to ensure everyone is protected through the traceability of communication. Under no circumstances should staff contact pupils, parents or conduct any school business using a personal email address. Pupils should use school approved accounts on the school system for educational purposes. Where required parent/carer permission will be obtained for the pupil account to exist. For advice on emailing, sharing personal or confidential information or the need to gain parent permission refer to the policy for GDPR. Emails created or received as part of any school role will be subject to disclosure in response to a request for information under the Freedom of Information Act 2000. Staff, governors and pupils should not open emails or attachments from suspect sources and should report their receipt to Xxxx Xxxxxxxxxxx, our IT Technician, for advice. Users must not send emails which are offensive, embarrassing or upsetting to anyone (i.e. cyberbullying). Visiting online sites and downloading • Staff must preview sites, software and apps before their use in school or before recommending them to pupils. Before using any online service that requires user accounts to be created or the sharing of any personal data, staff must consult with Xxxx Xxxxxxxxxxx, the Data Protection Officer, with details of the site/service and seek approval from a senior leader. The terms and conditions of the service should be read and adhered to, and parental/carer permission sought where required. If internet research is set for homework, specific sites will be suggested that have been checked by the teacher. All users must observe copyright of materials from electronic sources. • Staff must only use pre-approved systems if creating blogs, wikis or other online content. • When working with pupils searching for images should be done through Google Safe Search (standard through the HICS service), Google Advanced Search or a similar application that provides greater safety than a standard search engine. Users must not: Visit internet sites, make, post, download , upload or pass on, material, remarks, proposals or comments that contain or relate to: • Indecent images of children actually or apparently under the age of 18 or images of child abuse (i.e. images of children, digital or cartoons, involved in sexual activity or posed to be sexually provocative) • Indecent images of vulnerable people over the age of 18 (i.e. images of vulnerable people, digital or cartoons involved in sexual activity or posed to be sexually provocative) • Adult material that breaches the Obscene Publications Act in the UK • Promoting discrimination of any kind in relation to the protected characteristics: age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race or ethnicity, religion or belief, sex, sexual orientation • Promoting hatred against any individual or group from the protected characteristics above • Promoting illegal acts including physical or sexual abuse of children or adults, violence, bomb making, drug and alcohol abuse and software piracy • Any material that may bring the school or any individual within it into disrepute e.g. promotion of violence, gambling, libel and disrespect Users must not: • Reveal or publicise confidential or proprietary information • Intentionally interfere with the normal operation of the internet connection, including the propagation of computer viruses • Transmit unsolicited commercial or advertising material either to other users, or to organisations connected to other networks except where permission has been given to the school • Use the school's hardware and Wi-Fi facilities for running a private business • Intimidate, threaten or cause harm to others • Access or interfere in any way with other users' accounts • Use software or hardware that has been prohibited by the school Only a school device may be used to conduct school business outside of school. The only exception would be where a closed, monitorable system has been set up by the school for use on a personal device. Such a system would ensure the user was not saving files locally to their own device and breaching data security. A monitorable system would be one such as LARA. Through LARA, any school documents accessed on a personal device are never actually on the computer being used, they remain on the school server. When the user logs-out of XXXX, there are no copies left on their own device All breaches of prohibited behaviours detailed above will be investigated, where appropriate, in liaison with the police. The school recognises that in certain planned curricular activities, access to controversial and/or offensive online content may be beneficial for educational use. In such circumstances, there is an expectation that access is pre-planned, risk assessed and recorded, and permission given by the Headteacher.
RECOGNITION AND SCOPE 1.01 The Company agrees to recognize the Union as the sole collective bargaining agent for employees covered by this Agreement.
NOTICE TO PROCEED AND SCHEDULE The CONSULTANT shall begin the work to be performed under this Contract only upon receipt of the written notice to proceed from the LPA, and shall deliver the work to the LPA in accordance with the schedule contained in Appendix "C" which is herein attached to and made an integral part of this Contract.
RECOGNITION AND SCOPE OF AGREEMENT a) The Company recognizes the Union as the sole and exclusive Bargaining Agent for all Production Coordinators, 1st Assistant Production Coordinators and 2nd Assistant Production Coordinators, Production Assistants (with the exception of Set and Location PA’s) and any other classifications that may be contained in Schedule A of this agreement.
Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.