SECURITY OF POSITION Sample Clauses

SECURITY OF POSITION. 22.01 (a) For the purposes of this Article, “school” shall be defined as a building or group of buildings that receive a single staffing allotment in addition to the definition in Article 2.
AutoNDA by SimpleDocs
SECURITY OF POSITION. 12.01 (a) By May 15 in each School Year, the Board shall formulate a probable staffing proposal for the following year, said proposal to indicate the manner in which the Board intends to staff its schools and the allocation of supervisory personnel, specialists and teachers to the system and its schools. The probable staffing proposal shall identify all vacant or unfilled positions which are then known or reasonably foreseen.
SECURITY OF POSITION. 32.01 (a) For purposes of this Article, “
SECURITY OF POSITION. Individual designations made pursuant to this Article may be reviewed by the Management-Teacher Committee which will make every reasonable effort to resolve all designations.
SECURITY OF POSITION. When the pupil enrolment in the system decreases to the point where the number of professional staff must be reduced or a teaching or supervisory position has been phased out, the Board in selecting the teacher for staff reduction shall, with the exception of designated teachers, follow the official seniority list pursuant to Article Notwithstanding if no position available, then the provisions of Article shall apply.

Related to SECURITY OF POSITION

  • Abandonment of Position An employee who fails to report for duty for three consecutive working days without informing the Employer of the reason for their absence will be presumed to have abandoned their position. An employee will be afforded the opportunity within 10 days to rebut such presumption and demonstrate that there were reasonable grounds for not informing the Employer.

  • Security Breach Notifications Notice must be given by the Subrecipient to anyone whose PSCI could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security.

  • Elimination of Positions Existing positions of special responsibility shall not be eliminated or changed without prior consultation with the Association.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Determination of Position(s) The Appointing Authority shall determine the position(s) in the class or class option, if one exists, and employment condition and work location which is to be eliminated.

  • Security of State Information To the extent Contractor shall have access to, processes, handles, collects, transmits, stores or otherwise deals with State Data, the Contractor represents and warrants that it has implemented and it shall maintain during the term of this Master Agreement the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 4 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!