Protecting the Vulnerable Sample Clauses

Protecting the Vulnerable. There is a need to be more effective in sharing information about individuals who are at risk or vulnerable. This will, however, involve the most sensitive and confidential information, and the greatest care will need to be taken in this area. Examples might include: • Casework conferences involving several agencies in order to agree actions which will help to protect a vulnerable individual; • Sharing information on potentially violent individuals to enable our employees to take suitable precautions when contacting them for official reasons; • Developing packages of care and support that cross over a range of agencies in order to ensure that the optimum level of support is available to those in most need.
AutoNDA by SimpleDocs

Related to Protecting the Vulnerable

  • Information Regarding the Collateral (a) Furnish to the Administrative Agent at least fifteen (15) days (or such shorter period as the Administrative Agent may agree) prior written notice of any change in: (i) any Loan Party’s legal name; (ii) the location of any Loan Party’s chief executive office, its principal place of business, any office in which it maintains books or records relating to Collateral owned by it or any office or facility at which Collateral owned by it is located (including the establishment of any such new office or facility, but excluding in-transit Collateral); (iii) any Loan Party’s organizational structure or jurisdiction of incorporation or formation; or (iv) any Loan Party’s Federal Taxpayer Identification Number or organizational identification number assigned to it by its state of organization. The Loan Parties shall not effect or permit any change referred to in the preceding sentence unless the Loan Parties have undertaken all such action, if any, reasonably requested by the Administrative Agent under the UCC or otherwise that is required in order for the Collateral Agent to continue at all times following such change to have a valid, legal and perfected first priority security interest in all the Collateral for its own benefit and the benefit of the other Credit Parties. (b) From time to time as may be reasonably requested by the Administrative Agent, the Lead Borrower shall supplement each Schedule hereto, or any representation herein or in any other Loan Document, with respect to any matter arising after the Restatement Effective Date that is required to be set forth or described in such Schedule or as an exception to such representation or that is necessary to correct any information in such Schedule or representation which has been rendered inaccurate thereby (and, in the case of any supplements to any Schedule, such Schedule shall be appropriately marked to show the changes made therein). Notwithstanding the foregoing, no supplement or revision to any Schedule or representation shall be deemed the Credit Parties’ consent to the matters reflected in such updated Schedules or revised representations nor permit the Loan Parties to undertake any actions otherwise prohibited hereunder or fail to undertake any action required hereunder from the restrictions and requirements in existence prior to the delivery of such updated Schedules or such revision of a representation; nor shall any such supplement or revision to any Schedule or representation be deemed the Credit Parties’ waiver of any Default resulting from the matters disclosed therein.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Protection of Proprietary Information The Seller has taken all reasonable steps to maintain the confidentiality of and otherwise protect and enforce their rights in all proprietary information pertaining to the Seller or any Seller Product. Without limiting the generality of the foregoing, no portion of the source code for any software ever owned or developed by the Seller has been disclosed or licensed to any escrow agent or other Person.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Preservation of Marks Each Assignor agrees to use or license the use of its Marks in interstate commerce during the time in which this Agreement is in effect, sufficiently to preserve such Marks as trademarks or service marks registered under the laws of the United States or the relevant foreign jurisdiction.

  • No Third Party Rights Except as expressly provided in this Agreement, this Agreement is intended solely for the benefit of the parties hereto and is not intended to confer any benefits upon, or create any rights in favor of, any Person other than the parties hereto.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Enforcement of Proprietary Rights I will assist the Company in every proper way to obtain, and from time to time enforce, United States and foreign Proprietary Rights relating to Company Inventions in any and all countries. To that end I will execute, verify and deliver such documents and perform such other acts (including appearances as a witness) as the Company may reasonably request for use in applying for, obtaining, perfecting, evidencing, sustaining and enforcing such Proprietary Rights and the assignment thereof. In addition, I will execute, verify and deliver assignments of such Proprietary Rights to the Company or its designee. My obligation to assist the Company with respect to Proprietary Rights relating to such Company Inventions in any and all countries shall continue beyond the termination of my employment, but the Company shall compensate me at a reasonable rate after my termination for the time actually spent by me at the Company’s request on such assistance. In the event the Company is unable for any reason, after reasonable effort, to secure my signature on any document needed in connection with the actions specified in the preceding paragraph, I hereby irrevocably designate and appoint the Company and its duly authorized officers and agents as my agent and attorney in fact, which appointment is coupled with an interest, to act for and in my behalf to execute, verify and file any such documents and to do all other lawfully permitted acts to further the purposes of the preceding paragraph with the same legal force and effect as if executed by me. I hereby waive and quitclaim to the Company any and all claims, of any nature whatsoever, which I now or may hereafter have for infringement of any Proprietary Rights assigned hereunder to the Company.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Benefits of Agreement; No Third-Party Rights The provisions of this Agreement are intended solely to benefit the Member and, to the fullest extent permitted by applicable law, shall not be construed as conferring any benefit upon any creditor of the Company (and no such creditor shall be a third-party beneficiary of this Agreement), and the Member shall have no duty or obligation to any creditor of the Company to make any contributions or payments to the Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!