Special Job Security Plan Sample Clauses

Special Job Security Plan. 1. Any employee covered by the Job Security Plan who wants to adhere to the special Job Security Plan must forward his written request to the employer before November 1st of the year preceding the year in which he wishes to adhere to the special plan;
AutoNDA by SimpleDocs
Special Job Security Plan. The employee who wishes to benefit from this special plan must make the request before December 1st preceding the winter guarantee in question. This employee, covered by the job security plan, can be laid off according to seniority with no supplementary unemployment insurance benefits (PSAC) from the beginning of the winter guarantee as stipulated in Article 20.05.

Related to Special Job Security Plan

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

Time is Money Join Law Insider Premium to draft better contracts faster.