Security and Chain of Custody Sample Clauses

Security and Chain of Custody. An approved laboratory will maintain strict security at its facilities and rigorously follow proper chain of custody procedures. The laboratory will fully satisfy every security and chain of custody requirement of NIDA's Mandatory Guidelines for Federal Workplace Drug Testing Programs.
AutoNDA by SimpleDocs
Security and Chain of Custody. The selected laboratory will maintain strict security at its laboratory facilities and will strictly adhere to the chain of custody procedures mandated by the United States Department of Transportation (DOT) and the DHHS. This will include: a. Use of a standard drug testing custody and control form; b. Use of a clean, single-use specimen bottle that is securely wrapped until filled with the specimen, or use of a clean, single-use collection container that is securely wrapped until utilized; c. Use of a tamper-proof sealing system designed to ensure against undetected opening and the use of a specimen bottle with a unique identifying number which is identical to the number appearing on the custody and control form; d. Use of a shipping container in which the specimen and related paperwork may be transferred and which can be sealed and initialed to prevent undetected tampering. e. Written procedures, instructions and training to ensure the integrity of the process shall be provided to collection personnel.
Security and Chain of Custody. The selected laboratory will maintain strict security at its laboratory facilities and will strictly adhere to the chain of custody procedures mandated by the United States Department of Transportation (DOT) and the DHHS. This will include: Use of a standard drug testing custody and control form; Use of a clean, single-use specimen bottle that is securely wrapped until filled with the specimen, or use of a clean, single-use collection container that is securely wrapped until utilized; Use of a tamper-proof sealing system designed to ensure against undetected opening and the use of a specimen bottle with a unique identifying number which is identical to the number appearing on the custody and control form; Use of a shipping container in which the specimen and related paperwork may be transferred and which can be sealed and initialed to prevent undetected tampering. Written procedures, instructions and training to ensure the integrity of the process shall be provided to collection personnel.

Related to Security and Chain of Custody

  • Security and Charge 15.1 In consideration of the Supplier agreeing to supply the Goods, the Client charges all of its rights, title and interest (whether joint or several) in any land, realty or other assets capable of being charged, owned by the Client either now or in the future, to secure the performance by the Client of its obligations under these terms and conditions (including, but not limited to, the payment of any money). 15.2 The Client indemnifies the Supplier from and against all the Supplier’s costs and disbursements including legal costs on a solicitor and own client basis incurred in exercising the Supplier’s rights under this clause. 15.3 The Client irrevocably appoints the Supplier and each director of the Supplier as the Client’s true and lawful attorney/s to perform all necessary acts to give effect to the provisions of this clause 15 including, but not limited to, signing any document on the Client’s behalf.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union. 5:02 The Corporation agrees to deduct from the earnings of all employees, including probationary employees, covered by this Agreement, an amount each month as dues and upon completion of the probationary period an amount for the initiation fee. The amount of such dues and initiation fees shall be advised in writing by the I.B.E.W., Local 2351 and changes to such amounts shall be advised not less than four (4) weeks prior to the effective date. Dues collected shall be remitted within ten (10) days after each pay period, to the designated official of the Union along with a statement of the names, in alphabetical order, and amounts deducted from each employee. The statement will also include the names of employees whose wages are insufficient to permit such deduction and the Corporation will only be obligated to make such deduction from the immediate subsequent pay period. Employees on recall status must be members in good standing of the Union in order to be recalled. 5:03 The Union agrees that neither it nor any of its officers or members will engage in Union activities on Corporation time, or Corporation work area, except as provided in this Agreement. 5:04 The Union shall indemnify and save the Corporation harmless against any and all claims, demands, suits or other forms of liability that shall arise from or by reason of action taken or not taken by the Corporation for the purpose of complying with this Article. 5:05 The Corporation will submit monthly to the Union a list of the dates of new hires, terminations and transfers to and from the Bargaining Unit for the previous month. 5:06 The Union agrees to furnish the Corporation with the names of all personnel including officers, representatives, stewards and committee people who are authorized to represent the Union in its relations with the Corporation. 5:07 The Corporation agrees to supply all employees with a copy of the Collective Agreement and will endeavour to do so within one (1) month after receipt from the printer. 5:08 The Corporation shall provide bulletin boards in designated areas for the posting of Union notices dealing with meetings, election of officers, appointments and committees, social affairs and other non-controversial matters dealing with the affairs of the Union. No bulletin shall be posted until approved by the Human Resources Division or the designated Corporate representative.

  • UNION SECURITY AND CHECK-OFF 5.01 All present seniority employees who are currently members of the Union will be required to continue to be members of the Union as a condition of employment for the duration of this Agreement. 5.02 Present probationary employees and newly hired employees upon completion of their probationary period, shall become members of the Union, and will be required to continue to be members of the Union as a condition of employment for the duration of this Agreement. 5.03 The Company will deduct from the pay of each employee, including new hirees, the monthly dues and other assessments authorized by the constitution of the Union. The initiation fee shall be taken off the following pay period after the employee has completed his probationary period. This deduction will be shown on a separate column on the Union dues list prescribed in 5.04. The Union dues shall be taken off the following pay period after an employee has worked 40 hours in any one calendar month. Union dues shall be calculated on the basis of the average of an employee’s total earnings as defined in the constitution and by-laws of the national and local Union for the previous calendar month. The Company shall deduct from each employee’s regular supplemental unemployment benefits the monthly dues and other assessments as authorized by the constitution of the Union. The Union will notify the Company, in writing, two (2) weeks in advance of the relevant month of any changes in monthly dues deductions to be made. The Company agrees to include on an employee’s T4 slip for income tax purposes the total Union dues paid for the year, excluding any initiation fees. 5.04 A list of the total number of employees, along with all sums deducted as above shall be remitted by the Company to the financial secretary of the local Union by the 15th of the month following the month in which the deductions were made. This list will contain employee names, payroll numbers, addresses and telephone numbers, along with the amount of such deductions and the reason, if any, why no deductions were made from certain employees. This list will also indicate any employee whose employment is terminated, transferred out of the bargaining unit, on layoff, leave of absence, or died. The Company will also provide the financial secretary with the monthly alphabetical employee list. The Company will reimburse any employee any dues that have been deducted in error as long as a claim has been submitted to the Company before the last day of the calendar month in which the deduction was made. 5.05 The Union shall indemnify and save the Company harmless against any and all claims, demands, suits and other forms of liability that arise out of or by reason of any action taken or not taken by the Company for the purpose of complying with any of the provisions of this article, or in reliance on any lists, notice or assessment furnished under such provisions.

  • Security and Privacy Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference and may be updated from time to time in accordance with Section 10.12 of the Agreement, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/purecloud-security-compliance/.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements. B. The Contractor shall assure that each Attendee is advised of all the appropriate precautions that should be taken to provide for the Attendee’s safety while on the Property. The Contractor shall take every reasonable precaution to provide for the security of Attendees and their belongings. C. The Contractor shall immediately advise the Judicial Council’s staff of any known problems that involve the Attendees during the Program including, but not limited to, assaults, burglaries, accidents, and/or illnesses.

  • Security and Data Transfers Party shall comply with all applicable State and Agency of Human Services' policies and standards, especially those related to privacy and security. The State will advise the Party of any new policies, procedures, or protocols developed during the term of this agreement as they are issued and will work with the Party to implement any required. Party will ensure the physical and data security associated with computer equipment, including desktops, notebooks, and other portable devices, used in connection with this Agreement. Party will also assure that any media or mechanism used to store or transfer data to or from the State includes industry standard security mechanisms such as continually up-to-date malware protection and encryption. Party will make every reasonable effort to ensure media or data files transferred to the State are virus and spyware free. At the conclusion of this agreement and after successful delivery of the data to the State, Party shall securely delete data (including archival backups) from Party’s equipment that contains individually identifiable records, in accordance with standards adopted by the Agency of Human Services. Party, in the event of a data breach, shall comply with the terms of Section 7 above.

  • Security and Confidentiality Technical and organisational security measures must be taken by the data controller that are appropriate to the risks, such as against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, presented by the processing. Any person acting under the authority of the data controller, including a processor, must not process the data except on instructions from the data controller.

  • The Security Agreement The security interest granted pursuant to this Trademark Security Agreement is granted in conjunction with the security interest granted to the Collateral Agent pursuant to the Security Agreement and Grantor hereby acknowledges and affirms that the rights and remedies of the Collateral Agent with respect to the security interest in the Trademarks made and granted hereby are more fully set forth in the Security Agreement. In the event that any provision of this Trademark Security Agreement is deemed to conflict with the Security Agreement, the provisions of the Security Agreement shall control unless the Collateral Agent shall otherwise determine.

  • Data Security and Privacy (a) Each Group Member is, and at all times, has been, in compliance in all material respects with (i) all applicable Data Protection Laws, including, to the extent applicable, but not limited to the GDPR and those relating to cross-border transfers; (ii) all applicable contractual obligations of each Loan Party and its Subsidiaries concerning data privacy and security relating to Personal Data in the possession or control of any Group Member or maintained by third parties on behalf of such Group Member and having access to such information under contracts (or portions thereof) to which a Group Member is a party; and (iii) all applicable data transfer agreements and data processing agreements, including the EU standard contractual clauses, to which a Group Member is a party (collectively, “Privacy Agreements”): (b) Each Group Member is, and has been, in compliance in all material respects with all applicable prior and current written internal and public-facing privacy policies and notices of the Group Members regarding the collection, retention, use, processing, disclosure and distribution of Personal Data by the Group Members or their respective agents (collectively, the “Privacy Policies”), and the Privacy Policies have been maintained to be consistent in all material respects with the actual practices of each Group Member. The Privacy Policies contemplate the Group Members’ current uses of the Personal Data, and to the extent required under applicable Data Protection Laws, each Group Member has sought and obtained the appropriate consent from the applicable data subject for such uses. The Privacy Policies have made all material disclosures to users, customers, employees, or other individuals required by Data Protection Laws. (c) Each Group Member has implemented and maintains a commercially reasonable security program (“Security Program”) that (i) complies in all material respects with all applicable Data Protection Laws, applicable Privacy Policies, and applicable Privacy Agreements, and (ii) includes commercially reasonable administrative, technical, organization, and physical security procedures and measures designed to preserve the security and integrity of all Personal Data and any other sensitive or confidential information or data related to each Group Member (collectively, “Company Sensitive Information”) in such Group Member’s possession or control and to protect such Company Sensitive Information against unauthorized or unlawful processing, access, acquisition, use, theft, interruption, modification, disclosure, loss, destruction or damage. (d) Except as disclosed on Schedule 4.23(d), there has been (i) no actual, suspected or alleged (in writing) incidents of unauthorized access, use, intrusion, disclosure or breach of the security of any information technology systems owned or controlled by a Group Member or any of their contractors and used by such contractors on behalf of a Group Member, and (ii) no actual, suspected or alleged (in writing) incidents of unauthorized acquisition, destruction, damage, disclosure, loss, corruption, alteration, or use of any Company Sensitive Information, in each case that could reasonably be expected to cause a Material Adverse Effect. (e) Each Group Member has a valid and legal right (whether contractually, by applicable law or otherwise) to access or use all Personal Data that is accessed and used by or on behalf of a Group Member in connection with the sale, use and/or operation of their products, services and businesses. (f) Except as would not reasonably be expected to have a Material Adverse Effect, there is no pending or to the knowledge of any Loan Party, threatened in writing, complaints, claims, demands, inquiries, proceedings, or other notices, including any notices of any investigation or other legal proceedings, regarding a Group Member, initiated by (i) any Governmental Authority, including the United States Federal Trade Commission, a state attorney general, data protection authority or similar state official, or a supervisory authority; (ii) any counterparty to, or subject of, a Privacy Agreement; or (iii) any self-regulatory authority or entity, alleging that any activity of a Group Member: (1) is in violation of any applicable Data Protection Laws, (2) is in violation of any Privacy Agreements, (3) is in violation of any Privacy Policies or (4) is otherwise in violation of any person’s privacy, personal or confidentiality rights.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!