SAFETY/SECURITY PERSONNEL Sample Clauses

SAFETY/SECURITY PERSONNEL. 16.1 Work Day and Work Week Security personnel may be assigned to work eight (8) hours per day, inclusive of the lunch period, and shall be scheduled to work five (5) consecutive days per week. Security personnel hired prior to September 1, 1993 shall receive a shift differential of one dollar ($1.00) per hour for work on Saturday or Sunday if the work week is changed to include Saturday or Sunday.
AutoNDA by SimpleDocs
SAFETY/SECURITY PERSONNEL. 16.1 Work Day and Work Week Security personnel may be assigned to work eight (8) hours per day, inclusive of the lunch period, and shall be scheduled to work five (5) consecutive days per week. Security personnel hired prior to September 1, 1993 shall receive a shift differential of one dollar ($1.00) per hour for work on Saturday or Sunday if the work week is changed to include Saturday or Sunday. 16.2 Standby or On-Call Status Any Security personnel who are required by the District to remain on standby shall be prorated at the employee’s regular hourly rate, and shall be paid at one sixth (1/6th) of an hour for each hour on standby. Any employee required to remain on standby shall be paid a minimum of one (1) hour at his/her regular rate of pay.
SAFETY/SECURITY PERSONNEL. Work Day and Work Week 56 Section 16.2 Standby or On-Call Status 56 Section 16.3 Outside Contractor Exception 56 Section 16.4 Building Safety/Security Professional Development 56 Section 16.5 Safety/Security Personnel Attire 56 SIGNATURE PAGE 58 A: Non-Technology Salary Schedule 2021-2022, 2022-2023 59 B: Technology Salary Schedule 2021-2022-2022-2022-2023 61 C: RPTA Evaluation – Performance Appraisal 63 D: Employee Self-Reflection 66 E: RPTA Positions by Level 69 Training Stipends 71 Retention Bonuses 74 Health and Safety for 2021-2022 School Year 75

Related to SAFETY/SECURITY PERSONNEL

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • Contractor Key Personnel ‌ The Contractor shall assign a Corporate OASIS SB Program Manager (COPM) and Corporate OASIS SB Contract Manager (COCM) as Contractor Key Personnel to represent the Contractor as primary points-of-contact to resolve issues, perform administrative duties, and other functions that may arise relating to OASIS SB and task orders solicited and awarded under OASIS SB. Additional Key Personnel requirements may be designated by the OCO at the task order level. There is no minimum qualification requirements established for Contractor Key Personnel. Additionally, Contractor Key Personnel do not have to be full-time positions; however, the Contractor Key Personnel are expected to be fully proficient in the performance of their duties. The Contractor shall ensure that the OASIS SB CO has current point-of-contact information for both the COPM and COCM. In the event of a change to Contractor Key Personnel, the Contractor shall notify the OASIS SB CO and provide all Point of Contact information for the new Key Personnel within 5 calendar days of the change. All costs associated with Contractor Key Personnel duties shall be handled in accordance with the Contractor’s standard accounting practices; however, no costs for Contractor Key Personnel may be billed to the OASIS Program Office. Failure of Contractor Key Personnel to effectively and efficiently perform their duties will be construed as conduct detrimental to contract performance and may result in activation of Dormant Status and/or Off-Ramping (See Sections H.16. and H.17.).

  • Contractor Personnel Contractor's staff is expected to present a professional appearance. All personnel of the Contractor will be neat, well groomed, properly uniformed in industry standard uniforms and are expected to conduct themselves at all times in a responsible and courteous manner while performing any work under this Agreement and/or whenever they are on District property. The following code of conduct will be adhered to by the Contractor, his agent(s) and/or his employees. If Contractor fails to ensure that its employees or other agents comply with these requirements, then Contractor may be terminated for cause under this Agreement: A. All employees of the Contractor shall wear a recognizable uniform. No hats will be worn inside the building. All of Contractor’s employees and agents performing work must carry a government-issued photo ID. Contractor’s employees and agents will present ID to District Staff upon request. This provision will be strictly enforced. B. The use of tobacco or tobacco products on Board property is prohibited by State law. C. The Contractor will not be permitted to utilize Day Labor or Temporary Workers to provide any services at any District facility. This includes any employees or agents that are hired prior to contract award. Failure to comply with this requirement could result in immediate termination of contract with the Contractor liable for any breach, including liquidated damages for delay damages and/or forfeiture of Performance Bond. D. The Contractor or employees or agents of the Contractor are not permitted to play loud music, to make unnecessary noises, or to use vulgar or inappropriate language that causes offense to others. E. The employment of unauthorized or illegal aliens by the Contractor is considered a violation of Section 247A (e) of the Immigration and Naturalization Act. If the Contractor knowingly employs unauthorized aliens, such a violation shall also be cause for termination of this Agreement. F. Possession of firearms will not be tolerated on Board property. No person who has a firearm in their vehicle will be permitted to park on District property. Any employee of the Contractor found in violation of this policy will be immediately asked to leave, and will not be allowed to return to perform further work without the consent of the District. G. The Contractor certifies that he/she will not engage in the unlawful manufacture, sale distribution, dispensation, possession, or use of a controlled substance or drug during the performance of the contract and that a drug-free workplace will be provided for the Contractor’s employees or agents during the performance of the contract. The Contractor also certifies that he will secure from any subcontractor who works on the contract, written certification of the same drug free workplace requirements. False certification or violation by failing to carry out requirements of O.C.G.A. § 50-24-3 may cause suspension, termination of contract, or debarment of such bidder Please Note: If any employee or agent of the Contractor or Sub-contractor is found to have brought a firearm on District property, the Contractor or Sub-contractor shall prohibit them from continuing to perform any work on District property. If the Contractor or Sub-contractor fails to do so, then the District may terminate this Agreement for cause as set forth below.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Supplier Personnel The Customer and Supplier agree and acknowledge that in the event of the Supplier ceasing to provide the Services or part of them for any reason, Call Off Schedule 10 (Staff Transfer) shall apply. The Supplier shall not and shall procure that any relevant Sub-Contractor shall not take any step (expressly or implicitly and directly or indirectly by itself or through any other person) without the prior written consent of the Customer to dissuade or discourage any employees engaged in the provision of the Services from transferring their employment to the Customer and/or the Replacement Supplier and/or Replacement Sub-Contractor. During the Termination Assistance Period, the Supplier shall and shall procure that any relevant Sub-Contractor shall: give the Customer and/or the Replacement Supplier and/or Replacement Sub-Contractor reasonable access to the Supplier's personnel and/or their consultation representatives to present the case for transferring their employment to the Customer and/or the Replacement Supplier and/or to discuss or consult on any measures envisaged by the Customer, Replacement Supplier and/or Replacement Sub-Contractor in respect of persons expected to be Transferring Supplier Employees; co-operate with the Customer and the Replacement Supplier to ensure an effective consultation process and smooth transfer in respect of Transferring Supplier Employees in line with good employee relations and the effective continuity of the Services. The Supplier shall immediately notify the Customer or, at the direction of the Customer, the Replacement Supplier of any period of notice given by the Supplier or received from any person referred to in the Staffing Information, regardless of when such notice takes effect. The Supplier shall not for a period of twelve (12) months from the date of transfer re-employ or re-engage or entice any employees, suppliers or Sub-Contractors whose employment or engagement is transferred to the Customer and/or the Replacement Supplier except that this paragraph 10.5 shall not apply where an offer is made pursuant to an express right to make such offer under Call Off Schedule 10.1 (Staff Transfer) in respect of a Transferring Supplier Employee not identified in the Supplier's Final Supplier Personnel List.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • SAFETY PRECAUTIONS AND PROGRAMS The Contractor shall be responsible for initiating, maintaining and supervising all safety precautions and programs in connection with the Work.

  • Technical and Organisational Measures (1) Before the commencement of processing, the Supplier shall document the execution of the necessary Technical and Organisational Measures, set out in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the contract, and shall present these documented measures to the Client for inspection. Upon acceptance by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement. (2) The Supplier shall establish the security in accordance with Article 28 Paragraph 3 Point c, and Article 32 GDPR in particular in conjunction with Article 5 Paragraph 1, and Paragraph 2 GDPR. The measures to be taken are measures of data security and measures that guarantee a protection level appropriate to the risk concerning confidentiality, integrity, availability and resilience of the systems. The state of the art, implementation costs, the nature, scope and purposes of processing as well as the probability of occurrence and the severity of the risk to the rights and freedoms of natural persons within the meaning of Article 32 Paragraph 1 GDPR must be taken into account. [Details in Appendix 1] (3) The Technical and Organisational Measures are subject to technical progress and further development. In this respect, it is permissible for the Supplier to implement alternative adequate measures. In so doing, the security level of the defined measures must not be reduced. Substantial changes must be documented.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Safety Boots Each employee, after 3 months’ continuous service, will be reimbursed (on production of a receipt), the cost of one pair of safety boots (approved by the employer), in each year, to a maximum of $110.00. All protective clothing such as wet weather jackets, safety helmets, welding jackets, welding xxxxxxx, welding gauntlets, rubber boots, etc, (which remain the property of the Company), will be supplied on all occasions deemed necessary.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!