SECURITY OF POSITION Sample Clauses

SECURITY OF POSITION. 22.01 (a) For the purposes of this Article, “school” shall be defined as a building or group of buildings that receive a single staffing allotment in addition to the definition in Article 2.
AutoNDA by SimpleDocs
SECURITY OF POSITION. (a) By May 15 in each School Year, the Board shall formulate a probable staffing proposal for the following year, said proposal to indicate the manner in which the Board intends to staff its schools and the allocation of supervisory personnel, specialists and teachers to the system and its schools. The probable staffing proposal shall identify all vacant or unfilled positions which are then known or reasonably foreseen. (b) In preparing the staffing proposal the Director of Human Resources may designate a teacher as being essential to a program if necessary to retain a full complement of teachers in that program; (c) A teacher placed as a result of the designation of another teacher under this Article shall be considered to be in his/her original position for purposes of placement at the end of the School Year. In the event that the placements are mutually agreeable to the two affected teachers, both placements shall be made permanent. 12.02 At least two (2) weeks before May 15 in each School Year the Director of Human Resources and the three (3) CSANE representatives on the Management-Teacher Committee shall meet to review the probable staffing proposal. The Director of Human Resources shall fairly consider any proposal made by the Union to meet the need through voluntary transfer(s). 12.03 The Board shall each year declare and demonstrate that it has a surplus or deficit of teachers for the following School Year. Part of said demonstration shall be that such surplus or deficit exists in each school. 12.04 Surplus teachers pursuant to clause 12.03 shall be notified in writing by the Director of Human Resources once the probable staffing formula has been reviewed. 12.05 Where surplus teachers are shown to exist in a school, the surplus shall be resolved in accordance with the following procedure: (a) The Director of Human Resources shall post in each school a list of all vacant and unfilled positions. (b) The Director of Human Resources shall then request volunteers to transfer to vacant and unfilled positions in other schools. (c) With the mutual agreement of the Director of Human Resources and a teacher, a teacher shall transfer to a vacant or unfilled position in another school; and (i) If there still are surplus teachers in a school after the implementation of clause 12.05 (b) and clause 12.05 (c), surplus teachers shall be identified by seniority, subject to program protection as provided for in clause 12.01 (b) and shall be offered transfers to other...
SECURITY OF POSITION. (a) For purposes of this Article, “school” means a building or groups of buildings that receive a single staffing allotment to which the teacher is assigned. (b) Where staff reduction must occur within a school, the Board shall, after assigning teaching staff, first consider volunteers for staff reduction. Where there are no suitable volunteers, the position shall be phased-out and the teacher to be declared surplus shall be the least senior pursuant to Article 21.03 within the school, provided the retained more senior teacher has, in the opinion of the Board, the qualifications, abilities and experience for the work to be assigned. 19.02 If the teacher in the phased-out position feels he/she requires upgrading, the Board shall grant the teacher an unpaid Leave of Absence to obtain such retraining. 19.03 Such leave pursuant to Article 19.03 shall not exceed two (2) years unless for extraordinary circumstances more than two (2) years is required. Extensions beyond two (2) years may be made by mutual agreement. 19.04 All benefits of a teacher on Leave of Absence pursuant to Article 19.03, shall be suspended during the Leave of Absence but shall be reinstated when the teacher resumes teaching for the Board. 19.05 Notwithstanding Article 19.01, if there is no position vacant, staff reduction shall be carried out according to Article 21 – Seniority, Retention and Recall.
SECURITY OF POSITION. 13.01 (a) By May 15 in each School Year, the Board shall formulate a probable staffing proposal for the following year, said proposal to indicate the manner in which the Board intends to staff its schools and the allocation of supervisory personnel, specialists and teachers to the system and its schools. The probable staffing proposal shall identify all vacant or unfilled positions which are then known or reasonably foreseen.
SECURITY OF POSITION. (a) For purposes of this Article, “school” means a building site to which the teacher is assigned.
SECURITY OF POSITION. Individual designations made pursuant to this Article may be reviewed by the Management-Teacher Committee which will make every reasonable effort to resolve all designations.
SECURITY OF POSITION. When the pupil enrolment in the system decreases to the point where the number of professional staff must be reduced or a teaching or supervisory position has been phased out, the Board in selecting the teacher for staff reduction shall, with the exception of designated teachers, follow the official seniority list pursuant to Article Notwithstanding if no position available, then the provisions of Article shall apply.
AutoNDA by SimpleDocs
SECURITY OF POSITION. (a) By May 15 in each School Year, the Board shall formulate a probable staffing proposal for the following year, said proposal to indicate the manner in which the Board intends to staff its schools and the allocation of supervisory personnel, specialists and teachers to the system and its schools. The probable staffing proposal shall identify all vacant or unfilled positions which are then known or reasonably foreseen. (b) In preparing the staffing proposal the Director of Human Resources may designate a teacher as being essential to a program if necessary to retain a full complement of teachers in that program; (c) A teacher placed as a result of the designation of another teacher under this Article shall be considered to be in his/her original position for purposes of placement at the end of the School Year. In the event that the placements are mutually agreeable to the two affected teachers, both placements shall be made permanent. 12.02 At least two (2) weeks before May 15 in each School Year the Director of Human Resources and the three

Related to SECURITY OF POSITION

  • Abandonment of Position An employee who fails to report for duty for three consecutive working days without informing the Employer of the reason for their absence will be presumed to have abandoned their position. An employee will be afforded the opportunity within 10 days to rebut such presumption and demonstrate that there were reasonable grounds for not informing the Employer.

  • Security of processing (a) The data importer and, during transmission, also the data exporter shall implement appropriate technical and organisational measures to ensure the security of the data, including protection against a breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure or access to that data (hereinafter ‘personal data breach’). In assessing the appropriate level of security, the Parties shall take due account of the state of the art, the costs of implementation, the nature, scope, context and purpose(s) of processing and the risks involved in the processing for the data subjects. The Parties shall in particular consider having recourse to encryption or pseudonymisation, including during transmission, where the purpose of processing can be fulfilled in that manner. In case of pseudonymisation, the additional information for attributing the personal data to a specific data subject shall, where possible, remain under the exclusive control of the data exporter. In complying with its obligations under this paragraph, the data importer shall at least implement the technical and organisational measures specified in Annex II. The data importer shall carry out regular checks to ensure that these measures continue to provide an appropriate level of security. (b) The data importer shall grant access to the personal data to members of its personnel only to the extent strictly necessary for the implementation, management and monitoring of the contract. It shall ensure that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality. (c) In the event of a personal data breach concerning personal data processed by the data importer under these Clauses, the data importer shall take appropriate measures to address the breach, including measures to mitigate its adverse effects. The data importer shall also notify the data exporter without undue delay after having become aware of the breach. Such notification shall contain the details of a contact point where more information can be obtained, a description of the nature of the breach (including, where possible, categories and approximate number of data subjects and personal data records concerned), its likely consequences and the measures taken or proposed to address the breach including, where appropriate, measures to mitigate its possible adverse effects. Where, and in so far as, it is not possible to provide all information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. (d) The data importer shall cooperate with and assist the data exporter to enable the data exporter to comply with its obligations under Regulation (EU) 2016/679, in particular to notify the competent supervisory authority and the affected data subjects, taking into account the nature of processing and the information available to the data importer.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include: a. A list of the students whose Student Data was involved in or is reasonably believed to have been involved in the breach, if known; and b. The name and contact information for an employee of the Provider whom parents may contact to inquire about the breach.

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Clearances A. The General Contractor is to supply the Court with names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted one (1) week prior to access to the site. The Court has final word on who will or who will not be allowed on the project premises.

  • Security Clearance 6.7.1 Where specified by the Authority or the Contract user, the Supplier shall be responsible for ensuring that all Staff are security cleared to the level required by the Security Requirements not less than 5 Working Days before such person begins to perform the Services. If the Authority is responsible for applying for security clearance for Staff pursuant to this Clause 6.7.1, the Supplier shall provide a completed security clearance application form for such members of Staff to the Authority not less than 30 days before such members of Staff begin to perform the Services. 6.7.2 The Authority shall issue a pass for all Staff who are security cleared to an appropriate level for the Premises in accordance with Clause 6.7.1 on or before the date when such member of Staff is required to enter onto the Premises in Order to perform the Services. Passes shall remain the property of the Authority and shall be surrendered on demand or on termination or expiry of this Contract. 6.7.3 A member of Staff not in possession of a pass who is required by the Supplier or any Sub-contractor to provide the services urgently shall be allowed temporary access to the Premises on condition that the Supplier ensures, or procures that any Sub- contractor shall ensure, that such individual is accompanied at all times while on the Premises by a member of Staff who has been issued with a pass in accordance with Clause 6.7.1. 6.7.4 Without prejudice to the provisions of Clauses 6.7.1 to 6.7.3 inclusive, the Authority may refuse any member of Staff Admission to the Premises or require the removal of any member of Staff from the Premises in accordance with Clause 3.3 if such member of Staff is not in possession of a pass pursuant to Clause 6.7.2 or accompanied in accordance with Clause 6.7.3.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!