Workload Management 11.1 The parties to this Agreement acknowledge that employees and management have a responsibility to maintain a balanced workload and recognise the adverse affects that excessive workloads may have on employee/s and the quality of resident/client care. 11.2 To ensure that employee concerns involving excessive workloads are effectively dealt with by Management the following procedures should be applied: (a) Step 1: In the first instance, employee/s should discuss the issue with their immediate supervisor and, where appropriate, explore solutions. (b) Step 2: If a solution cannot be identified and implemented, the matter should be referred to an appropriate senior manager for further discussion. (c) Step 3: If a solution still cannot be identified and implemented, the matter should be referred to the Facility Manager for further discussion. (d) Step 4: The outcome of the discussions at each level and any proposed solutions should be recorded in writing and fed back to the effected employees. 11.3 Workload management must be an agenda item at staff meetings on at least a quarterly basis. Items in relation to workloads must be recorded in the minutes of the staff meeting, as well as actions to be taken to resolve the workloads issue/s. Resolution of workload issues should be based on the following criteria including but not limited to: (a) Clinical assessment of residents’ needs; (b) The demand of the environment such as facility layout; (c) Statutory obligation, (including, but not limited to, work health and safety legislation); (d) The requirements of nurse regulatory legislation; (e) Reasonable workloads (such as roster arrangements); (f) Accreditation standards; and (g) Budgetary considerations. 11.4 If the issue is still unresolved, the employee/s may advance the matter through Clause 9 Dispute Resolution Procedure. Arbitration of workload management issues may only occur by agreement of the employer and the employee representative, which may include the union/s.
Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.
Advisory and Management Arrangements Subject to the requirements of applicable law as in effect from time to time, the Trustees may in their discretion from time to time enter into advisory, administration or management contracts (including, in each case, one or more sub-advisory, sub-administration or sub-management contracts) whereby the other party to any such contract shall undertake to furnish such advisory, administrative and management services with respect to the Trust as the Trustees shall from time to time consider desirable and all upon such terms and conditions as the Trustees may in their discretion determine. Notwithstanding any provisions of this Declaration, the Trustees may authorize any advisor, administrator or manager (subject to such general or specific instructions as the Trustees may from time to time adopt) to exercise any of the powers of the Trustees, including to effect investment transactions with respect to the assets on behalf of the Trust to the full extent of the power of the Trustees to effect such transactions or may authorize any officer, employee or Trustee to effect such transactions pursuant to recommendations of any such advisor, administrator or manager (and all without further action by the Trustees). Any such investment transaction shall be deemed to have been authorized by all of the Trustees.
Incident Management 3.1. We shall notify You without undue delay after We becomes aware of any accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data, including Personal Data, stored or otherwise processed by Us or Our sub-processors of which We become aware (“Security Incident”). 3.2. We shall use best efforts to identify the cause of such Security Incident and take the measures We deem necessary and within Our control for remediating and securing Customer Data; We shall coordinate such efforts with You without undue delay.
Investment Advisory and Management Services The Investment Adviser hereby appoints the Subadviser to serve as subadviser to the Fund and the Subadviser hereby accepts such appointment. Subject to the supervision of the Investment Adviser, Subadviser will regularly provide the Fund with investment advice and investment management services concerning the investments of the Fund. The Subadviser will determine what securities shall be purchased, held or sold by the Fund and what portion of the Funds assets shall be held uninvested in cash and cash equivalents, subject always to the provisions of the Trusts Declaration of Trust and By-laws and the 1940 Act, and to the investment objectives, policies and restrictions applicable to the Fund (including, without limitation, the requirements of Subchapters L and M of the Internal Revenue Code of 1986, as amended) (the Code), as each of the same shall be from time to time in effect or set forth in the Funds Prospectus and Statement of Additional Information, as well as any other investment guidelines or policies the Board of Trustees or the Investment Adviser may from time to time establish and deliver in writing to the Subadviser. To carry out such determinations the Subadviser will exercise full discretion, subject to the preceding paragraph, and act for the Fund in the same manner and with the same force and effect as the Trust might or could do with respect to purchases, sales or other transactions, as well as with respect to all other things necessary or incidental to the furtherance or conduct of such purchases, sales or other transactions. Notwithstanding the foregoing, the Subadviser shall, upon written instructions from the Investment Adviser, effect such portfolio transactions for the Fund as the Investment Adviser may from time to time direct. Such instructions will be given in reasonable circumstances, including, without limitation, any termination of this Agreement. The Subadviser will also make its officers and employees available to meet with the officers of the Investment Adviser and the Trusts officers and Trustees at least quarterly on due notice to review the investments and investment program of the Fund in the light of current and prospective economic and market conditions. From time to time as the Board of Trustees of the Trust or the Investment Adviser may reasonably request, the Subadviser will furnish to the Investment Adviser and Trusts officers and to each of its Trustees, at the Subadvisers expense, reports on portfolio transactions and reports on issues of securities held by the Fund, all in such detail as the Trust or the Investment Adviser may reasonably request. The Subadviser shall maintain all books and records required by Rule 31a-1 under the 1940 Act relating to its responsibilities provided hereunder with respect to the Fund, and shall preserve such records for the periods and in a manner prescribed by Rule 31a-2 under the 1940 Act. The Subadviser shall permit the Investment Adviser, the Funds officers and its independent public accountants to inspect and audit such records at reasonable times during normal business hours upon due notice. If any occasion should arise in which the Subadviser gives any advice to its clients concerning the shares of the Fund, the Subadviser will act solely as investment counsel for such clients and not in any way on behalf of the Fund. The Subadvisers services to the Fund pursuant to this Agreement are not to be deemed to be exclusive, and it is understood that the Subadviser may render investment advice, management and other services to others.
Construction Management Landlord or its Affiliate or agent shall supervise the Work, make disbursements required to be made to the contractor, and act as a liaison between the contractor and Tenant and coordinate the relationship between the Work, the Building and the Building’s Systems. In consideration for Landlord’s construction supervision services, Tenant shall pay to Landlord a construction supervision fee equal to three percent (3%) of Tenant’s Costs specified in Section 7.
Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.
Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.
Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.
Management In accordance with Section 18-402 of the Act, management of the Company shall be vested in the Member. The Member shall have the power to do any and all acts necessary, convenient or incidental to or for the furtherance of the purposes described herein, including all powers, statutory or otherwise, possessed by members of a limited liability company under the laws of the State of Delaware. The Member has the authority to bind the Company.