Protecting Vulnerable Persons (PVP) Unit Sample Clauses

Protecting Vulnerable Persons (PVP) Unit. Requests for information to be shared and their subsequent discussions may be raised at formal meetings. All formal meetings are minuted, and the subsequent documents are shared securely in password protected format via email. Occasionally, additional requests are made over email, where they are requested verbally this is followed up by confirmation email. Any information provided by the Police to the Diocese of Lincoln will be held securely within the diocesan safeguarding office and will only be shared on a need to know basis in safeguarding other church attendees. Information Management Unit (IMU): Requests that fall outside the remit of a meeting as described in para 2.2 will be made in writing using a request for personal information form (P698A). The form will be submitted to the XXXX team within the IMU using the following email address: xxxxxxxxxx@xxxxx.xxx.xxxxxx.xx Requests made through the Information Management Unit will be logged, completed and stored on the police crime recording system Niche. Replies to requests to the XXXX team will be made within ten working days. MOSOVO team: When required the MOSOVO team within Lincolnshire Police will inform the Diocesan Safeguarding Team if they are or become aware a Registered Sex Offender (RSO) is attending a Church. The MOSOVO team will record disclosures of information on their relevant case management system and will ensure that the information is shared via secure means.
AutoNDA by SimpleDocs

Related to Protecting Vulnerable Persons (PVP) Unit

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Protecting Your Personal Information In addition to protecting your access codes, you should also take precautions to protect your personal identification information, such as your driver’s license, Social Security number, or tax identification number. This information by itself or together with account information may allow unauthorized access to your accounts. You should treat personal information with the same level of care that you would for your account information. You should also protect and secure all information and data stored in any personal computer or other equipment you use to access our Online Banking service.

  • Movement of Natural Persons 1. This Article applies to measures affecting natural persons who are service suppliers of a Party, and natural persons of a Party who are employed by a service supplier of a Party, in respect of the supply of a service.

  • Services and Information for Persons with Limited English Proficiency A. Grantee shall take reasonable steps to provide services and information both orally and in writing, in appropriate languages other than English, to ensure that persons with limited English proficiency are effectively informed and can have meaningful access to programs, benefits and activities. Meaningful access may entail providing language assistance services, including oral interpretation and written translation, if necessary. More information can be found at xxxxx://xxx.xxx.xxx/.

  • Reliance on Third Party Service Providers Each Party may allow Reporting Financial Institutions to use third party service providers to fulfill the obligations imposed on such Reporting Financial Institutions by a Party, as contemplated in this Agreement, but these obligations shall remain the responsibility of the Reporting Financial Institutions.

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Access to Persons and Records The State Auditor shall have access to persons and records as a result of all contracts or grants entered into by State agencies or political subdivisions in accordance with General Statute 147-64.7. Additionally, as the State funding authority, the Department of Health and Human Services shall have access to persons and records as a result of all contracts or grants entered into by State agencies or political subdivisions.

  • Engagement of the TAM Representative Outside of Red Hat Standard Business Hours If you have purchased Premium Red Hat Software Subscriptions, you will receive 24x7 Support for Severity 1 and 2 issues through Red Hat’s 24x7 Production Support teams and not necessarily from your assigned TAM representative. Red Hat’s 24x7 Production Support team will be responsible for addressing issues, but will consult with your TAM representative, as your TAM representative is available, for advice and to gain a better understanding of your infrastructure, environment and specific needs. If you have purchased multiple TAM Service Subscriptions in each of Red Hat’s primary Support Regions, you will receive the benefit of extended TAM Service coverage hours, but you should follow the same process and contact the Red Hat 24x7 support numbers at xxxxx://xxxxxx.xxxxxx.xxx/support/contact/technicalSupport.html.

Time is Money Join Law Insider Premium to draft better contracts faster.