Protected Training Time Guidelines Sample Clauses

Protected Training Time Guidelines. The NREG will sponsor a project to develop an agreed set of national guidelines on protected training time for RMOs, recognising the agreed entitlements as specified in the MECA. The guidelines will include: • Acknowledgement of the respective responsibilities of the DHB to train RMOs and for RMOs to participate in training activity; • Confirmation of what activities constitute “training”, within the current definition of the MECA and acknowledging the requirements of the Medical Council of New Zealand and the Vocational Colleges; and • How PTT can be appropriately “protected” without compromising patient care The intention being that the guidelines will be endorsed by NREG no later than 30 December 2012. LREGs will be responsible for reviewing local compliance and for putting in place a plan to address areas of non-compliance.
AutoNDA by SimpleDocs

Related to Protected Training Time Guidelines

  • Restricted Use of Confidential Information (a) Each Receiving Party acknowledges the confidential and proprietary nature of the Confidential Information of the Disclosing Party and agrees that such Confidential Information (i) shall be kept confidential by the Receiving Party; (ii) shall not be used for any reason or purpose other than to evaluate and consummate the Contemplated Transactions; and (iii) without limiting the foregoing, shall not be disclosed by the Receiving Party to any Person, except in each case as otherwise expressly permitted by the terms of this Agreement or with the prior written consent of an authorized representative of Seller with respect to Confidential Information of Seller(each, a "Seller Contact") or an authorized representative of Buyer with respect to Confidential Information of Buyer (each, a "Buyer Contact"). Each of Buyer and Seller shall disclose the Confidential Information of the other party only to its Representatives who require such material for the purpose of evaluating the transactions contemplated herein and are informed by Buyer or Seller, as the case may be, of the obligations of this Article 12 with respect to such information. Each of Buyer and Seller shall (iv) enforce the terms of this Article 12 as to its respective representatives; (v) take such action to the extent necessary to cause its representatives to comply with the terms and conditions of this Article 12; and (vi) be responsible and liable for any breach of the provisions of this Article 12 by it or its representatives. (b) Unless and until this Agreement is terminated, Seller shall maintain as confidential any Confidential Information (including for this purpose any information of Seller of the type referred to in Sections 12.l(a)(i), (ii) and (iii), whether or not disclosed to Buyer) of the Seller or Shareholders relating to any of the Assets or the Assumed Liabilities. (c) From and after the Closing, the provisions of Section 12.2(a) above shall not apply to or restrict in any manner Buyer's use of any Confidential Information of the Seller relating to any of the Assets or the Assumed Liabilities.

  • Disciplinary Information There are no legal or disciplinary events to disclose in response to this item.

  • Company Confidential Information The Subscriber acknowledges that the Company is engaged in business development including programs of research and development and the marketing of products and services. The Subscriber also recognizes the importance of protecting the Company’s trade secrets, confidential information and other proprietary information and related rights acquired through such Company’s expenditure of time, effort and money. Therefore, in consideration of the Company permitting the Subscriber to submit this subscription and have access to the Company’s information and/or Company’s confidential information otherwise coming to the Subscriber, the Subscriber agrees to be bound by the following terms and conditions with respect to the Company:

  • Confidential Information Protections 4.1 At all times during and after the Employee’s employment, the Employee will hold in confidence and will not disclose, use, lecture upon, or publish any of Company’s Confidential Information (defined below), except as may be required in connection with the Employee’s work for Company, or as expressly authorized by the Board. The Employee will obtain the written approval of the Board before publishing or submitting for publication any material (written, oral, or otherwise) that relates to the Employee’s work at Company and/or incorporates any Confidential Information. The Employee hereby assigns to Company any rights the Employee may have or acquire in any and all Confidential Information and recognize that all Confidential Information shall be the sole and exclusive property of Company and its assigns.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Protection of Proprietary Information The Seller has taken all reasonable steps to maintain the confidentiality of and otherwise protect and enforce their rights in all proprietary information pertaining to the Seller or any Seller Product. Without limiting the generality of the foregoing, no portion of the source code for any software ever owned or developed by the Seller has been disclosed or licensed to any escrow agent or other Person.

  • Trade Secrets and Confidential Information/Company Property Employee reaffirms and agrees to observe and abide by the terms of the Employment Agreement and the Confidentiality Agreement, specifically including the provisions therein regarding nondisclosure of the Company’s trade secrets and confidential and proprietary information, and the restrictive covenants contained therein. Employee’s signature below constitutes his certification under penalty of perjury that he has returned all documents and other items provided to Employee by the Company, developed or obtained by Employee in connection with his employment with the Company, or otherwise belonging to the Company.

  • Treatment of Proprietary and Confidential Information A. Both parties agree that it may be necessary to provide each other during the term of this Agreement with certain confidential information, including trade secret information, including but not limited to, technical and business plans, technical information, proposals, specifications, drawings, procedures, customer account data and like information (hereinafter collectively referred to as “Information”). Both parties agree that all Information shall either be in writing or other tangible format and clearly marked with a confidential, private or proprietary legend, or, when the Information is communicated orally, it shall also be communicated that the Information is confidential, private or proprietary. The Information will be returned to the owner within a reasonable time. Both parties agree that the Information shall not be copied or reproduced in any form. Both parties agree to receive such Information and not disclose such Information. Both parties agree to protect the Information received from distribution, disclosure or dissemination to anyone except employees of the parties with a need to know such Information and which employees agree to be bound by the terms of this Section. Both parties will use the same standard of care to protect Information received as they would use to protect their own confidential and proprietary Information. B. Notwithstanding the foregoing, both parties agree that there will be no obligation to protect any portion of the Information that is either: 1) made publicly available by the owner of the Information or lawfully disclosed by a nonparty to this Agreement; 2) lawfully obtained from any source other than the owner of the Information; or 3) previously known to the receiving party without an obligation to keep it confidential.

  • Trade Secrets and Confidential Information (i) Executive represents and warrants that Executive (A) is not subject to any legal or contractual duty or agreement that would prevent or prohibit Executive from performing the duties contemplated by this Agreement or otherwise complying with this Agreement, and (B) is not in breach of any legal or contractual duty or agreement, including any agreement concerning trade secrets or confidential information owned by any other party. (ii) Executive agrees that Executive will not (A) use, disclose or reverse engineer Trade Secrets or Confidential Information for any purpose other than the Company’s Business, except as authorized in writing by the Company; (B) during Executive’s employment with the Company, use, disclose or reverse engineer (1) any confidential information or trade secrets of any former employer or third party or (2) any works of authorship developed in whole or in part by Executive during any former employment or for any other party, unless authorized in writing by the former employer or third party; or (C) upon Executive’s resignation or termination with the Company (1) retain Trade Secrets or Confidential Information, including any copies existing in any form (including electronic form), which are in Executive’s possession or control or (2) destroy, delete or alter Trade Secrets or Confidential Information without the Company’s prior written consent. (iii) The obligations under this Section 8 shall remain in effect as long as Trade Secrets and Confidential Information constitute trade secrets or confidential information under applicable law. The confidentiality, property and proprietary rights protections available in this Agreement are in addition to, and not exclusive of, any and all other rights to which the Company is entitled under federal and state law, including, but not limited to, rights provided under copyright laws, trade secret and confidential information laws and laws concerning fiduciary duties.

  • Subpoenas Directed to BellSouth Where BellSouth provides resold services or local switching for <<customer_name>>, BellSouth shall respond to subpoenas and court ordered requests delivered directly to BellSouth for the purpose of providing call detail records when the targeted telephone numbers belong to <<customer_name>> end users. Billing for such requests will be generated by BellSouth and directed to the law enforcement agency initiating the request. BellSouth shall maintain such information for <<customer_name>> end users for the same length of time it maintains such information for its own end users.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!