Qualified unemployed educators Sample Clauses

Qualified unemployed educators. The principal must obtain a list from the relevant provincial education department’s database of names of the educators mentioned above (2.5.1.) and who are qualified to fill the post.
AutoNDA by SimpleDocs
Qualified unemployed educators. Preference must be given to the educator in the order set out in paragraph 1.1.1 of Annexure A.

Related to Qualified unemployed educators

  • Resident Educator A Resident Educator is a teacher employed under a resident educator license.

  • Union Education If the local union indicates to the Hospital that its members have approved a special assessment for union education in accordance with the CUPE constitution and local union by laws, the Hospital agrees to deduct this assessment. Such assessment will be paid on a quarterly basis into a trust fund established and administered by OCHU/CUPE for this purpose.

  • Dimensions Education Bachelor’s Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience. A minimum of 4 years of IT work experience in data modeling, data analysis, relational DBMS design and support and relevant computing environments.

  • In-Service Education The parties recognize the value of in-service both to the employee and the Employer and shall encourage employees to participate in in-service. All employees scheduled by the Employer to attend in-service seminars shall receive regular wages.

  • Continuing Education The Hospital and the Union recognize that continuing education is important for all employees and that they have shared interests and responsibilities in ensuring equitable access to it.

  • Resident Educator Program The four-year program is designed to provide newly licensed Ohio educators quality mentoring and guidance. Successful completion of the residency program is required to advance to a five-year professional educator license.

  • Paid Education Leave The Company agrees to pay into a special fund effective January 1st, 2013 and each year thereafter, two thousand ($2,000.00) for the purpose of providing Paid Education Leave. Said Paid Education Leave will be for the purpose of upgrading the Dependent Contractor’s skills in all aspects of trade union functions. Such monies will be paid into a trust fund established by the National Union, Unifor and sent by the Company to the following address: Unifor Education Leave Program c/o Unifor 000 Xxxxxx Xxxxx Xxxxxxx, XX X0X 0X0 The Company further agrees that members of the bargaining unit selected by the Union to attend such courses will be granted a Leave of Absence without pay for twenty (20) days class time, plus travel time where necessary, with said Leave of Absence to be intermittent over a twelve (12) month period from the first day of leave. Dependent Contractors on such leave will continue to accrue seniority and benefits during such leave.

  • General Education Requirements Students who intend to transfer to SUNY Buffalo State College with an A.A. or A.S. degree, will be considered as having fulfilled general education/Intellectual Foundations as long as they complete the 30 credits and 7 of 10 areas of SUNY-GER requirements prior to the start of their studies at SUNY Buffalo State College. Students should have successfully completed the SUNY-GER Basic Communication requirement with a grade of “C” or better, the mathematics requirement, and 5 of the remaining 8 categories. The student is responsible for fulfilling the SUNY Buffalo State College Diversity requirement.

  • General Education University Program Requirements All MTA applicable courses require a grade “C” or higher

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!