Sharing of Model School Security Policies (MSSP) Sample Clauses

Sharing of Model School Security Policies (MSSP). The Model School Security Policies for law enforcement agencies issued pursuant to the Attorney General's Law Enforcement Directive No. 2007-1 on the topics of bomb threats, active shooter response, school lockdowns, school evacuations and public information policies shall serve as templates for the development of local law enforcement policies. Local law enforcement officials shall discuss the policies which they adopt on these topics with school administrators from the school district or districts within their jurisdiction. It is further understood that school administrators shall share their procedures for critical incidents, developed in accordance with the policies issued by the Commissioner of Education, with local law enforcement officials. These procedures shall remain confidential and shall not be shared with the public.
AutoNDA by SimpleDocs

Related to Sharing of Model School Security Policies (MSSP)

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Copies of policies; letters of undertaking Each Borrower shall ensure that all approved brokers provide the Security Trustee with pro forma copies of all policies relating to the obligatory insurances which they are to effect or renew and of a letter or letters of undertaking in a form required by the Security Trustee and including undertakings by the approved brokers that: (a) they will have endorsed on each policy, immediately upon issue, a loss payable clause and a notice of assignment complying with the provisions of Clause 13.4; (b) they will hold such policies, and the benefit of such insurances, to the order of the Security Trustee in accordance with the said loss payable clause; (c) they will advise the Security Trustee immediately of any material change to the terms of the obligatory insurances; (d) they will notify the Security Trustee, not less than 14 days before the expiry of the obligatory insurances, in the event of their not having received notice of renewal instructions from that Borrower or its agents and, in the event of their receiving instructions to renew, they will promptly notify the Security Trustee of the terms of the instructions; and (e) they will not set off against any sum recoverable in respect of a claim relating to the Ship owned by that Borrower under such obligatory insurances any premiums or other amounts due to them or any other person whether in respect of that Ship or otherwise, they waive any lien on the policies, or any sums received under them, which they might have in respect of such premiums or other amounts, and they will not cancel such obligatory insurances by reason of non-payment of such premiums or other amounts, and will arrange for a separate policy to be issued in respect of that Ship forthwith upon being so requested by the Security Trustee.

  • Security Policies IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security training to personnel who support IBM data centers. We have an information security team. IBM security policies and standards are reviewed and re-evaluated annually. IBM security incidents are handled in accordance with a comprehensive incident response procedure.

  • Replacement of Key Personnel The Engineer must notify the State in writing as soon as possible, but no later than three business days after a project manager or other key personnel is removed from association with this contract, giving the reason for removal.

  • Coordination, Oversight and Monitoring of Service Providers As set forth in the Administrative Services Agreement between the Fund and CRMC, CRMC shall coordinate, monitor and oversee the activities performed by the Service Providers with which AFS contracts. AFS shall monitor Service Providers’ provision of services including the delivery of Customer account statements and all Fund-related material, including summary prospectuses and/or prospectuses, shareholder reports, and proxies.

  • OFFICE OF MANAGEMENT AND BUDGET (OMB) AUDIT REQUIREMENTS The parties shall comply with the requirements of the Single Audit Act of 1984, P.L. 98-502, ensuring that the single audit report includes the coverage stipulated in 2 CFR 200.

  • Competitive Supplier’s Standard Credit Policy The Competitive Supplier will not require a credit review for any consumer participating in the Program, nor does Competitive Supplier require any consumer to post any security deposit as a condition for participation in the Program. The Competitive Supplier may terminate service to a Participating Consumer and return such consumer to Basic Service in the event that the consumer fails to pay to Competitive Supplier amounts past-due greater than sixty (60) days.

  • Summary of Policy and Prohibitions on Procurement Lobbying Pursuant to State Finance Law §139-j and §139-k, this Contract includes and imposes certain restrictions on communications between OGS and a Vendor during the procurement process. A Vendor is restricted from making contacts from the earliest notice of intent to solicit offers/bids through final award and approval of the Procurement Contract by OGS and, if applicable, the Office of the State Comptroller (“restricted period”) to other than designated staff unless it is a contact that is included among certain statutory exceptions set forth in State Finance Law §139-j(3)(a). Designated staff, as of the date hereof, is identified in Appendix G, Contractor and OGS Information, or as otherwise indicated by OGS. OGS employees are also required to obtain certain information when contacted during the restricted period and make a determination of the responsibility of the Vendor pursuant to these two statutes. Certain findings of non-responsibility can result in rejection for contract award and in the event of two findings within a four-year period; the Vendor is debarred from obtaining governmental Procurement Contracts. Further information about these requirements can be found on the OGS website: xxxx://xxx.xxx.xx.xxx/aboutOgs/regulations/defaultSFL_139j-k.asp.

  • Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”). Data Escrow. Registry Operator shall comply with the registry data escrow procedures set forth in Specification 2 attached hereto (“Specification 2”).

  • Policies, Guidelines, Directives and Standards Either the Funder or the Ministry will give the HSP Notice of any amendments to the manuals, guidelines or policies identified in Schedule C. An amendment will be effective in accordance with the terms of the amendment. By signing a copy of this Agreement the HSP acknowledges that it has a copy of the documents identified in Schedule C.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!