Reporting Official Time Sample Clauses

Reporting Official Time. All Union representatives shall document their use of official time in the same manner as their work output is accounted.
AutoNDA by SimpleDocs
Reporting Official Time. Union representatives shall record, via the Agency’s automated official time tracking system, currently the Labor Distribution Reporting (LDR) system, the appropriate category into which the use of all such official time falls as defined below. If the Parties discover certain official time activities are not being recorded in the proper category, the Parties agree to meet at the national level to resolve the problem.
Reporting Official Time. A. Each Union representative shall timely submit to his/her supervisor a biweekly written report (email will suffice) of the amount of official time that he/she has spent on Union activities covered by this Article by submitting approved copies of the official time forms within two (2) calendar days of the end of the pay period. The submission will be provided to the Employee and Labor Relations branch or designee. B. Union representatives will use the following categories in completing their time and attendance report: 1. Term Negotiations (LRT): This category is for reporting official time hours used by union representatives to negotiate a basic collective bargaining agreement or its successor, as provided in 5 U.S.C. 7131.
Reporting Official Time. All Union representatives and BUE shall document their use of official time in the same manner as their work output is accounted. As an example, MIS provides a category to record official Union time.

Related to Reporting Official Time

  • LOAN OF GOVERNMENT PROPERTY The parties shall enter into a NASA Form 893, Loan of NASA Equipment, for NASA equipment loaned to Partner.

  • Vendor Certification of Criminal History Texas Education Code Chapter 22 8 Texas Education Code Chapter 22 requires entities that contract with school districts to provide services to obtain DEFINITIONS Covered employees: Employees of a contractor or subcontractor who have or will have continuing duties related to the service to be performed at the District and have or will have direct contact with students. The District will be the final arbiter of what constitutes direct contact with students. Disqualifying criminal history: Any conviction or other criminal history information designated by the District, or one of the following offenses, if at the time of the offense, the victim was under 18 or enrolled in a public school: (a) a felony offense under Title 5, Texas Penal Code; (b) an offense for which a defendant is required to register as a sex offender under Chapter 62, Texas Code of Criminal Procedure; or (c) an equivalent offense under federal law or the laws of another state. Vendor certifies: NONE (Section A): None of the employees of Vendor and any subcontractors are covered employees, as defined above. If this box is checked, I further certify that Contractor has taken precautions or imposed conditions to ensure that the employees of Vendor and any subcontractor will not become covered employees. Contractor will maintain these precautions or conditions throughout the time the contracted services are provided under this procurement. SOME (Section B): Some or all of the employees of Vendor and any subcontractor are covered employees. If this box is checked, I further certify that: (1) Vendor has obtained all required criminal history record information regarding its covered employees. None of the covered employees has a disqualifying criminal history; (2) If Vendor receives information that a covered employee subsequently has a reported criminal history, Vendor will immediately remove the covered employee from contract duties and notify the purchasing entity in writing within 3 business days; (3) Upon request, Vendor will provide the purchasing entity with the name and any other requested information of covered employees so that the purchasing entity may obtain criminal history record information on the covered employees; (4) If the purchasing entity objects to the assignment of a covered employee on the basis of the covered employee's criminal history record information, Xxxxxx agrees to discontinue using that covered employee to provide services at the purchasing entity. Certification Regarding "Choice of Law" Terms with TIPS Members Certification Regarding "Venue" Terms with TIPS Members Certification Regarding "Automatic Renewal" Terms with TIPS Members Certification Regarding "Indemnity" Terms with TIPS Members Certification Regarding "Arbitration" Terms with TIPS Members

  • Notification of Government Investigation or Legal Proceeding Provider shall notify OIG, in writing, of any ongoing investigation or legal proceeding by a governmental entity or its agents involving an allegation that Provider has committed a crime or has engaged in fraudulent activities, within 30 days of Provider receiving notice of such investigation or legal proceeding. This notification shall include a description of the allegation(s), the identity of the investigating or prosecuting agency, and the status of such investigation or legal proceeding. Within 30 days after resolution of the matter, Provider shall notify OIG, in writing, of the resolution of the investigation or legal proceeding.

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release. (b) Vendor will provide such notification to the District by contacting Xxxxxx Xxx, Data Protection Officer, directly by email at xxxxxx.xxx@xxxxx.xxx or by calling 000-000-0000. (c) Vendor will cooperate with the District and provide as much information as possible directly to Xxxxxx Xxx, Data Protection Officer or his/her designee about the incident, including but not limited to: a description of the incident, the date of the incident, the date Vendor discovered or was informed of the incident, a description of the types of Protected Data involved, an estimate of the number of records affected, the schools within the District affected, what the Vendor has done or plans to do to investigate the incident, stop the breach and mitigate any further unauthorized access or release of Protected Data, and contact information for Vendor representatives who can assist affected individuals that may have additional questions. (d) Vendor acknowledges that upon initial notification from Vendor, the District, as the educational agency with which Vendor contracts, has an obligation under Section 2-d to in turn notify the Chief Privacy Officer in the New York State Education Department (“CPO”). Vendor agrees not to provide this notification to the CPO directly unless requested by the District or otherwise required by law. In the event the CPO contacts Vendor directly or requests more information from Vendor regarding the incident after having been initially informed of the incident by the District, Vendor will promptly inform Xxxxxx Xxx, Data Protection Officer or his/her designee.

  • Field Training Officer When a Public Safety Officer has been designated as a Field Training Officer for a new employee he/she will receive a five percent (5%) increase for all the hours they provide direct training/instruction.

  • Currency and Foreign Transactions Reporting Act The operations of the Company are and have been conducted at all times in compliance with (i) the requirements of the U.S. Treasury Department Office of Foreign Asset Control and (ii) applicable financial recordkeeping and reporting requirements of the Currency and Foreign Transaction Reporting Act of 1970, as amended, including the Money Laundering Control Act of 1986, as amended, the rules and regulations thereunder and any related or similar money laundering statutes, rules, regulations or guidelines, issued, administered or enforced by any Federal governmental agency (collectively, the “Money Laundering Laws”) and no action, suit or proceeding by or before any court or governmental agency, authority or body or any arbitrator involving the Company with respect to the Money Laundering Laws is pending or, to the Company’s knowledge, assuming reasonable inquiry, threatened.

  • Foreign Account Tax Compliance Act (FATCA) The Issuer agrees (i) upon the request of the Trustee, to provide the Trustee with such reasonable information as it has in its possession to enable the Trustee to determine whether any payments pursuant to this Indenture are subject to the withholding requirements described in Section 1471(b) of the Code or otherwise imposed pursuant to Sections 1471 through 1474 of the Code and any regulations, or agreements thereunder or official interpretations thereof (“Applicable Law”), and (ii) that the Trustee shall be entitled to make any withholding or deduction from payments under the Indenture to the extent necessary to comply with Applicable Law, for which the Trustee shall not have any liability.

  • Foreign Assets/Account Reporting Information Italian residents who, during the fiscal year, hold investments abroad or foreign financial assets (e.g., cash, Shares and RSUs) which may generate income taxable in Italy are required to report such on their annual tax returns (UNICO Form, RW Schedule) or on a special form if no tax return is due. The same reporting obligations apply to Italian residents who, even if they do not directly hold investments abroad or foreign financial assets (e.g., cash, Shares and RSUs), are beneficial owners of the investment pursuant to Italian money laundering provisions.

  • Erroneous Application Agent shall not be liable for any application of amounts made by it in good faith and, if any such application is subsequently determined to have been made in error, the sole recourse of any Lender or other Person to which such amount should have been made shall be to recover the amount from the Person that actually received it (and, if such amount was received by any Lender, such Lender hereby agrees to return it).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!