Revised Policies and Procedures Sample Clauses

Revised Policies and Procedures. Within sixty (60) calendar days of the Effective Date of this Agreement, SFHMC shall review and revise its policies and procedures as necessary to ensure effective communication with deaf or hard of hearing Patients or Companions, consistent with the requirements of Title III of the ADA and Section 504, and submit to the United States for its approval. The United States shall make its best effort to review the revised policy and procedures within fifteen (15) calendar days of its receipt. SFHMC will adjust or amend these proposed policies and procedures to address any comments and concerns identified by the United States. The policy and procedures shall not be implemented by SFHMC without the approval of the United States. Within thirty (30) calendar days after approval by the United States, SFHMC shall implement the policies and procedures and distribute, by mail, email, or other means, the revised policies and procedures, to all SFHMC personnel. SFHMC’s policy and procedures shall, at a minimum, fully implement each of the following practices and procedures:
AutoNDA by SimpleDocs
Revised Policies and Procedures. In collaboration with the Consultant, the District will review and revise, as necessary, its Section 504 Policies and Grievance Procedures. At a minimum, the District’s revised Section 504 Policies and revised Grievance Procedures will provide the following:
Revised Policies and Procedures. The Contractor must agree to review and, as necessary, revise its compensation practices and establish monitoring and oversight mechanisms to ensure that all aspects of its compensation system provide an equal opportunity for all its employees as required by 41 CFR § 60-1.4(a). All of the Contractor’s pay practices must ensure nondiscrimination in rates of pay or other forms of compensation.
Revised Policies and Procedures. Within sixty (60) calendar days after the Effective Date of this Agreement, ETMC shall adapt and submit to OCR the Auxiliary Aids and Services For Persons With Disabilities Policy and Procedures, at Attachment F, to ensure effective communication with deaf or hard of hearing Patients and Companions, consistent with the requirements of this Agreement and Section 504. The revised policy and procedures shall include, at a minimum, the following:
Revised Policies and Procedures. Within sixty (60) calendar days of the Effective Date of this Agreement, ADC shall adopt and submit to OCR a policy and procedures to ensure effective communication with deaf or hard of hearing Patients and/or Companions, consistent with the requirements of this Agreement and Section 504. The Auxiliary Aids and Services For Persons With Disabilities Policy and Procedures, at Attachment F, has been provided as a reference to ADC in drafting its own policy and procedures. ADC’s revised policy and procedures shall include, at a minimum, the following:
Revised Policies and Procedures. Within sixty (60) calendar days of the Effective Date of this Agreement, Genesis shall develop and submit to OCR a policy and procedures to ensure effective communication with deaf or hard of hearing Patients and/or Companions, consistent with the requirements of this Agreement and Section 504. The Auxiliary Aids and Services for Persons with Disabilities Policy and Procedures, at Attachment E, have been provided as a reference to Genesis in drafting its own policy and procedures. Genesis’ revised policy and procedures shall include, at a minimum, the following:
Revised Policies and Procedures. Within sixty (60) calendar days of the Effective Date of this Agreement, JDH shall review and revise its policies and procedures as necessary to ensure effective communication with deaf or hard of hearing Patients or Companions, consistent with the requirements of this Agreement and Title II of the ADA, Section 504, and Section 1557, and submit to the United States for its approval. JDH will adjust or amend these proposed policies and procedures to address any comments and concerns identified by the United States. The policy and procedures shall not be implemented by JDH without the approval of the United States. Within thirty (30) calendar days after approval by the United States, JDH shall implement the policies and procedures and distribute, by mail, email, or other means, the revised policies and procedures, to all JDH personnel.
AutoNDA by SimpleDocs
Revised Policies and Procedures. Within sixty (60) calendar days of the Effective date of this Agreement, DCH shall adapt and submit to OCR the Auxiliary Aids and Services For Persons With Disabilities Policy and Procedures, at Attachment F, to ensure effective communication with deaf or hard of hearing Patients and/or Companions, consistent with the requirements of this Agreement and Section 504. The revised policy and procedures shall include, at a minimum, the following:

Related to Revised Policies and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Rules and Procedures (a) The Benefit Society By-Laws will be amended to provide for a 6th Director with three Directors appointed by the Unions and three Directors appointed by the Corporation.

  • Ordering Guidelines and Processes 1.14.1 For information regarding Ordering Guidelines and Processes for various Network Elements, Combinations and Other Services, TWTC should refer to the “Guides” section of the AT&T Interconnection Web site. TWTC will be notified of any material changes to such “Guides”.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls:

  • Operational Procedures In order to minimize operational problems, it will be necessary for trade information to be supplied in a secure manner by the Subadviser to the Fund’s Service Providers, including: JPMorgan Chase Bank, National Association (the “Custodian”), Virtus Fund Services (the “Fund Administrator”) BNY Mellon Investment Servicing (US) Inc., (the “Sub-Accounting Agent”), any Prime Broker to the Series, and all other Counterparties/Brokers as required. The Subadviser must furnish the Fund’s service providers with required daily information as to executed trades in a format and time-frame agreed to by the Subadviser, Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties and designated persons of the Fund. Trade information sent to the Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties must include all necessary data within the required timeframes to allow such parties to perform their obligations to the Series. The Sub-Accounting Agent specifically requires a daily trade blotter with a summary of all trades, in addition to trade feeds, including, if no trades are executed, a report to that effect. Daily information as to executed trades for same-day settlement and future trades must be sent to the Sub-Accounting Agent no later than 4:30 p.m. (Eastern Time) on the day of the trade each day the Fund is open for business. All other executed trades must be delivered to the Sub-Accounting Agent on Trade Date plus 1 by Noon (Eastern Time) to ensure that they are part of the Series’ NAV calculation. (The Subadviser will be responsible for reimbursement to the Fund for any loss caused by the Subadviser’s failure to comply with the requirements of this Schedule A.) On fiscal quarter ends and calendar quarter ends, all trades must be delivered to the Sub-Accounting Agent by 4:30 p.m. (Eastern Time) for inclusion in the financial statements of the Series. The data to be sent to the Sub-Accounting Agent and/or Fund Administrator will be as agreed by the Subadviser, Fund Administrator, Sub-Accounting Agent and designated persons of the Fund and shall include (without limitation) the following:

  • Policy and Procedure The school seeks to ensure that internet, mobile and digital technologies are used effectively and safely, for their intended educational purpose, in ways that will not infringe legal requirements or create unnecessary risk. The school expects everyone to use internet, mobile and digital technologies responsibly and strictly according to the conditions set out in this policy. This policy also includes expectations on appropriate online behaviour and use of technology outside of school for pupils, parents/carers, staff and governors and all other visitors to the school. Use of email Staff and governors should use a school email account or Governor Hub for all official school communication to ensure everyone is protected through the traceability of communication. Under no circumstances should staff contact pupils, parents or conduct any school business using a personal email address. Pupils should use school approved accounts on the school system for educational purposes. Where required parent/carer permission will be obtained for the pupil account to exist. For advice on emailing, sharing personal or confidential information or the need to gain parent permission refer to the policy for GDPR. Emails created or received as part of any school role will be subject to disclosure in response to a request for information under the Freedom of Information Act 2000. Staff, governors and pupils should not open emails or attachments from suspect sources and should report their receipt to Xxxx Xxxxxxxxxxx, our IT Technician, for advice. Users must not send emails which are offensive, embarrassing or upsetting to anyone (i.e. cyberbullying). Visiting online sites and downloading • Staff must preview sites, software and apps before their use in school or before recommending them to pupils. Before using any online service that requires user accounts to be created or the sharing of any personal data, staff must consult with Xxxx Xxxxxxxxxxx, the Data Protection Officer, with details of the site/service and seek approval from a senior leader. The terms and conditions of the service should be read and adhered to, and parental/carer permission sought where required. If internet research is set for homework, specific sites will be suggested that have been checked by the teacher. All users must observe copyright of materials from electronic sources. • Staff must only use pre-approved systems if creating blogs, wikis or other online content. • When working with pupils searching for images should be done through Google Safe Search (standard through the HICS service), Google Advanced Search or a similar application that provides greater safety than a standard search engine. Users must not: Visit internet sites, make, post, download , upload or pass on, material, remarks, proposals or comments that contain or relate to: • Indecent images of children actually or apparently under the age of 18 or images of child abuse (i.e. images of children, digital or cartoons, involved in sexual activity or posed to be sexually provocative) • Indecent images of vulnerable people over the age of 18 (i.e. images of vulnerable people, digital or cartoons involved in sexual activity or posed to be sexually provocative) • Adult material that breaches the Obscene Publications Act in the UK • Promoting discrimination of any kind in relation to the protected characteristics: age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race or ethnicity, religion or belief, sex, sexual orientation • Promoting hatred against any individual or group from the protected characteristics above • Promoting illegal acts including physical or sexual abuse of children or adults, violence, bomb making, drug and alcohol abuse and software piracy • Any material that may bring the school or any individual within it into disrepute e.g. promotion of violence, gambling, libel and disrespect Users must not: • Reveal or publicise confidential or proprietary information • Intentionally interfere with the normal operation of the internet connection, including the propagation of computer viruses • Transmit unsolicited commercial or advertising material either to other users, or to organisations connected to other networks except where permission has been given to the school • Use the school's hardware and Wi-Fi facilities for running a private business • Intimidate, threaten or cause harm to others • Access or interfere in any way with other users' accounts • Use software or hardware that has been prohibited by the school Only a school device may be used to conduct school business outside of school. The only exception would be where a closed, monitorable system has been set up by the school for use on a personal device. Such a system would ensure the user was not saving files locally to their own device and breaching data security. A monitorable system would be one such as LARA. Through LARA, any school documents accessed on a personal device are never actually on the computer being used, they remain on the school server. When the user logs-out of XXXX, there are no copies left on their own device All breaches of prohibited behaviours detailed above will be investigated, where appropriate, in liaison with the police. The school recognises that in certain planned curricular activities, access to controversial and/or offensive online content may be beneficial for educational use. In such circumstances, there is an expectation that access is pre-planned, risk assessed and recorded, and permission given by the Headteacher.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!