Purging of Files Sample Clauses

Purging of Files. Offenses will be removed from an employee’s file according to the following structure: GROUP I OFFENSES: After five (5) years from the time of the incident. GROUP II AND III OFFENSES: After two (2) years from the time of the incident, provided that no further violations/offenses occurred within that two (2) year period. Section 11:01‌
AutoNDA by SimpleDocs
Purging of Files. 30.01 The Board agrees to purge all department files, including a Member's personnel file of:
Purging of Files. Material once placed in a Licensed Educational Interpreters personnel file may be removed from such file by the mutual agreement of the Licensed Educational Interpreter and the Superintendent or his/her designee. All negative material will be removed from the file after 36 months, at the request of the Licensed Educational Interpreter if there has been no other record of occurrence in the file. Such material will also be removed if either a grievance contending that it was placed in the file without following the procedures of section 14.02 is sustained or a grievance contending that it is false is sustained.
Purging of Files. 32.01 Except as set out in Article 32.02, the Board agrees to purge all Service files, including a Member's personnel file of:
Purging of Files. An employee's file may be purged of reprimands, warnings, or poor evaluations after fifteen months of continuous employment during which time no such reprimands, warnings or poor evaluations were issued.

Related to Purging of Files

  • Grievance Files Written grievances and responses will be maintained separately from the employee’s personnel file.

  • Processing of Deposit files The use of compression is recommended in order to reduce electronic data transfer times, and storage capacity requirements. Data encryption will be used to ensure the privacy of registry escrow data. Files processed for compression and encryption will be in the binary OpenPGP format as per OpenPGP Message Format -­‐ RFC 4880, see Part A, Section 9, reference 3 of this Specification. Acceptable algorithms for Public-­‐key cryptography, Symmetric-­‐key cryptography, Hash and Compression are those enumerated in XXX 0000, not marked as deprecated in OpenPGP IANA Registry, see Part A, Section 9, reference 4 of this Specification, that are also royalty-­‐free. The process to follow for the data file in original text format is:

  • Access to Files 12.01 A copy of any completed evaluation which is to be placed in a nurse's file shall be first reviewed with the nurse. The nurse shall initial such evaluation as having been read and shall have the opportunity to add views to such evaluation prior to it being placed in a file. Each nurse shall have reasonable access to the file for the purposes of reviewing any evaluations or formal disciplinary notations contained therein in the presence of the supervisor. A copy of the evaluation will be provided to the nurse at the nurse's request.

  • EMPLOYEE FILES 10.01 A copy of any completed formal evaluation which is to be placed in an employee’s file shall be first reviewed with the employee. The employee shall initial such evaluation as having been read and shall have the opportunity to add her or his views to such evaluation prior to it being placed in her or his file. It is understood that such evaluations do not constitute disciplinary action by the Employer against the employee. Having provided a written request to the Director of Care, or her designate, an employee shall be entitled to her personnel file for the purpose of reviewing any evaluations or formal disciplinary notations contained therein, in the presence of the Director of Care, at a mutually agreeable time.

Time is Money Join Law Insider Premium to draft better contracts faster.