Security and Background Sample Clauses

Security and Background. The Company reserves the right to conduct necessary personal background investigations. Any refusal to supply or authorize access to information or lack of cooperation on the part of the employee in the course of such investigation may result in termination of employment and should be considered just cause. Failure to meet State or Federal requirements will be just cause for termination. The Company will be responsible for the cost associated with background checks for union members in good standing.
AutoNDA by SimpleDocs
Security and Background. The Employer reserves the right to conduct necessary personal background investigations for Safety Ambassadors. Any refusal to supply or authorize access to information or lack of cooperation on the part of the employee in the course of such investigation may result in termination of employment. Failure to meet State or Federal requirements will be just cause for termination of Safety Ambassadors. With the exception of the initial fingerprint-based Bureau of Criminal Apprehension check on external applicants for Safety Ambassador positions, the Employer shall be responsible for the costs associated with background checks. For applicants to Safety Ambassador positions, this background check shall occur at the time of hire and the results of the investigation known to the applicant as soon as the Employer has received the results of the background check. For existing Clean Ambassadors being reassigned to be Safety Ambassadors, security and background checks shall occur at the time of reassignment of job classification and the results of the investigation known to the employee as soon as the Employer has received the results of the background check. Applicants shall be told at the time of hire that these investigations will determine their eligibility of employment. Existing employees who, as a result of a security and background check do not meet the eligibility for the Safety Ambassador position, shall remain in their original job classification.
Security and Background. The Company reserves the right to conduct necessary personal background investigations where and whenever the placement of the employee involves sensitive work environment. Fingerprinting may also be required. Any refusal to supply or authorize access to information or lack of cooperation on the part of the employee in the course of such investigation may result in termination of employment.
Security and Background. The Company shall comply with all Federal State, and local laws pertaining to access to secured areas within the airport environment which may necessarily require employee background investigations based upon fingerprint and other personal identification data. Any refusal to supply or authorize access to information, or lack of cooperation on the part of the employee in the course of such investigation may result in termination of employment.

Related to Security and Background

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • Data Security and Privacy 13.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Background 1.1. The “Work” is the research article, review article, letter, clinical trial study, report, article, or other copyright work, as identified in the Copyright Letter and further detailed in Schedule 1: Details of the Work (including such form of the copyright work submitted to Xxxxxxx Science for publication pursuant to clause 4, below), but excluding (except where context otherwise requires) any diagrams, figures or illustration specifically identified to Xxxxxxx Science pursuant to clause 3.2, below.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!