Security Practices A. Protected data provided to the contractor will be stored: (include where and how) B. The security protections taken to ensure data will be protected that align with the NIST Cybersecurity Framework and industry best practices include:
SAFETY PRACTICES (a) The employer will take reasonable measures to prevent and eliminate any present or potential job hazards which the employees may encounter at their places of work.
Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01
Procedures and Practices (a) The members of the Works Committee may:
Personnel Practices Section 1. The parties agree to establish a Labor-Management Committee to consult on personnel practices. The Committee will consist of five (5) representatives selected by the County and five (5) representatives by the SEIU Local 721. The Chief Executive Officer will designate a representative from CEO/Employee Relations and Department of Human Resources who have authority to resolve issues. The Committee will meet quarterly and consult on County-wide personnel practices including, but not limited to, performance evaluations, appraisals of promotability, grievance, arbitration, appeal processes, and resolution and payment of awards.
Good industry practices 12.1.1. SAP warrants that: a) its Services will be performed in a professional xxxxxxx-like manner by Consultants with the skills reasonably required for the Services; and
Work Practices Employees must be willing and able to comply with the following work practices.
SAFETY PRECAUTIONS AND PROGRAMS The Contractor shall be responsible for initiating, maintaining and supervising all safety precautions and programs in connection with the Work.
Pay Practices The Employer recognizes the importance of regularity in pay practices and to the greatest extent possible the Employer will not alter the payment routines. Nurses will be notified in writing by the Employer not less than sixty (60) days in advance of a change to the pay practices.
Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.