Qualified Interpreters at Booking and Intake Sample Clauses

Qualified Interpreters at Booking and Intake a. As soon as Personnel learn that a person who is deaf or hard of hearing will arrive at the Detention Facility, they will inquire through all available means as to whether the person would like to use a qualified interpreter and whether use of an interpreter is necessary for effective communication under the circumstances, i.e., the nature, length, context, complexity and importance of the anticipated communication, and the person’s usual method of communication. If so, a qualified interpreter will be provided to facilitate and complete the booking process. b. If a detainee or inmate who is deaf or hard of hearing expresses or demonstrates a medical condition or need that cannot wait for the assistance of a qualified interpreter to facilitate communication, or Personnel suspect there is medical need or condition requiring immediate treatment or other immediate response, Personnel shall not delay in providing whatever medical care, treatment, evaluation, or service would be provided to a non-deaf or hard of hearing person under similar circumstance. In such event, Personnel shall use the most effective means of communicating with the detainee or inmate readily available until such time as a qualified interpreter is present.
AutoNDA by SimpleDocs

Related to Qualified Interpreters at Booking and Intake

  • Switching and Tagging Rules Each Party shall provide the other Parties a copy of its switching and tagging rules that are applicable to the other Parties’ activities. Such switching and tagging rules shall be developed on a non-discriminatory basis. The Parties shall comply with applicable switching and tagging rules, as amended from time to time, in obtaining clearances for work or for switching operations on equipment.

  • Open and Transparent Consistent with ICANN’s expressed mission and core values, ICANN shall operate in an open and transparent manner.

  • Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.

  • Skidding and Yarding Methods of skid- ding or yarding specified for particular areas, if any, are indicated on Sale Area Map. Outside Clearcutting Units and construction clearings, insofar as ground conditions permit, products shall not be skidded against reserve trees or groups of reproduction and tractors shall be equipped with a winch to facilitate skidding. B6.421 Rigging. Insofar as practicable, needed rigging shall be slung on stumps or trees desig- nated for cutting.

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • Requirements Pertaining Only to Federal Grants and Subrecipient Agreements If this Agreement is a grant that is funded in whole or in part by Federal funds:

  • Secure Information Handling and Transfers 7.1 Physical and electronic handling, processing and transferring of DWP Data, including secure access to systems and the use of encryption where appropriate.

  • Payment of Checks, Drafts and Orders Subject to Section 9.5, the Assuming Institution agrees to pay all properly drawn checks, drafts and withdrawal orders of depositors of the Failed Bank presented for payment, whether drawn on the check or draft forms provided by the Failed Bank or by the Assuming Institution, to the extent that the Deposit balances to the credit of the respective makers or drawers assumed by the Assuming Institution under this Agreement are sufficient to permit the payment thereof, and in all other respects to discharge, in the usual course of conducting a banking business, the duties and obligations of the Failed Bank with respect to the Deposit balances due and owing to the depositors of the Failed Bank assumed by the Assuming Institution under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!