Protection of child Sample Clauses

Protection of child. Examinations and interviews of a child who may have been the subject of abuse shall be con- ducted under such circumstances and with such safeguards as are designed to minimize addi- tional trauma to the child and, where time per- mits, shall be conducted with the advise,1 or under the guidance, of a local multidisciplinary team established pursuant to section 3210 of this title or, in the absence of a local team, a multi- disciplinary team established pursuant to sec- tion 3209 of this title.
AutoNDA by SimpleDocs

Related to Protection of child

  • Protection of Human Subjects The Recipient agrees to comply with the requirements of the National Research Act, as amended, 42 U.S.C. §§ 289 et seq., and U.S. DOT regulations, “Protection of Human Subjects,” 49 C.F.R. Part 11, pertaining to protections for human subjects participating in or involved in research, development, and activities related to the Project.

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to give all reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom.

  • Protection of Privacy Act You acknowledge that all or part of the information you are required to keep, may be information deemed to be under the control of the LDB and may be subject to the provisions of Freedom of Information and Protection of Privacy Act if a request is made to the LDB for such information.

  • Protection of Rights Licensee shall not copy, translate, disassemble, decompile, nor reverse engineer the Software or other SAP Materials. Licensee shall not create or attempt to create the source code from the object code of the Software or other SAP Materials. Licensee is permitted to back up data in accordance with good information technology practice and for this purpose to create the necessary backup copies of the Software. Backup copies on transportable discs or other data media must be marked as backup copies and bear the same copyright and authorship notice as the original discs or other data media, unless technically infeasible. Licensee must not change or remove SAP’s copyright and authorship notices.

  • Protection of Personal Data 25.1 The Parties agree that they may obtain and have access to personal data for the duration of the Agreement for the fulfilment of the rights and obligations contained herein. In performing the obligations as set out in this Agreement, the Parties shall at all times ensure that:

  • Protection of Privacy Personal information in possession of Student Housing and Community Services about the resident will not be released to persons outside the University administration, including family members or friends, without the written consent of the applicant, unless permitted or required by law. In accordance with the Freedom of Information and Protection of Privacy Act, UBC permits information to be shared among University employees if it relates directly to, and is necessary for fulfilling the requirements of their role. This is especially important when the health and/or safety of an individual or the community may be at risk.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Protection of Watershed PURCHASER shall take all necessary precautions to prevent damage to stream banks, any stream course, lake, reservoir, or forested wetland within or adjacent to the timber sale area. Definitions of Type F, Type D, and Type N streams contained in the Forest Practices Act apply to this contract. In addition to other protective measures required, PURCHASER shall discontinue all or part of the operations under this contract upon notice from STATE that operations will cause excessive damage to the watershed.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!