Staff Training on Applicable Citizens’ Policies Sample Clauses

Staff Training on Applicable Citizens’ Policies. Vendor shall be responsible for training Vendor Staff on all applicable Citizens’ policies and procedures as applicable to the individual deployment request. Citizens will provide all applicable policies, procedures and training materials to be used during Vendor’s training. Vendor must ensure the required training is completed by Vendor Staff prior to performing any Services. Vendor Staff may be required to attend additional training (online and/or classroom) sessions as deemed necessary by Citizens. In addition to training, Vendor shall be responsible for maintaining complete training records for Vendor Staff. At its sole discretion, Citizens reserves the right to institute learning via a learning management system that tracks and records Vendor Staff training and scores. To meet Citizens’ training requirements, Vendor shall comply with the following for all Vendor Staff: 5.4.5.1. Vendor shall provide a trainer resource responsible for providing training to all of Vendor Staff. Training shall include applicable Citizens’ policies and procedures, Citizens systems and any other items as identified by Citizens; 5.4.5.2. Vendor must utilize the appropriate training materials provided by Citizens. Updated training materials will be presented by Citizens to appropriate Vendor Staff in a "Training Workshop;” 5.4.5.3. Vendor must provide an initial training to be completed prior to Vendor or Vendor Staff receiving and accepting any work assignments or otherwise performing Services; and, 5.4.5.4. Provide recertification training with Citizens issued training materials. Recertification training may occur through a webinar. Citizens reserves the right to request training dates, proof of attendance, applicable documents and the training site location. Citizens’ certification requirements will include but not be limited to training on: a. Citizens’ policy history, background, interpretation and application; b. estimating platforms related to any Citizens’ specific procedures or guidelines; c. assignment workflow; d. communications expectations; e. Public Records requirements; and, f. ethics and confidentiality requirements. In addition, Vendor shall ensure that all Adjusters and managers are properly trained and proficient in the use of the most recent version of estimating software utilized by Citizens. At no cost or expense to Citizens, Vendor shall obtain, implement, utilize, and maintain the estimating software currently used by Citizens to perform the Services. ...
AutoNDA by SimpleDocs
Staff Training on Applicable Citizens’ Policies. Vendor shall be responsible for training all staff performing Appraisal Services on Citizens policies and procedures. Upon Contract execution, and by June 15th annually thereafter, Citizens will conduct a mandatory “Training Workshop” whereby Citizens will train Vendor’s training resource(s) and will provide all applicable policies, procedures and training materials to be used during Vendor’s initial and annual training of Vendor Staff. Vendor must ensure the required training is completed by its staff prior to staff performing any Appraisal Services on behalf of Citizens. Vendor’s Staff may be required to attend additional training (online and/or classroom) sessions as deemed necessary by Citizens. In addition to training, the Vendor shall be responsible for maintaining complete training records for all staff performing Appraisal Services. At its sole discretion, Citizens reserves the right, to institute learning via a learning management system that tracks and records Vendor Staff training and scores.
Staff Training on Applicable Citizens’ Policies. Vendor shall be responsible for training Vendor Staff on all Citizens policies and procedures applicable to the Services. Upon execution of this Agreement Citizens may require a “Training Workshop” whereby Citizens will train Vendor’s training resource(s) and will provide all applicable policies, procedures, and training materials to be used during Vendor’s initial and annual training of Vendor Staff prior to performing any Services on behalf of Citizens. Vendor Staff may be required to attend additional training sessions as deemed necessary by Citizens. In addition to training, the Vendor shall be responsible for maintaining complete training records for all staff performing Services. At its sole discretion, Citizens reserves the right to institute learning via a learning management system that tracks and records Vendor Staff training and scores.

Related to Staff Training on Applicable Citizens’ Policies

  • Sick Leave Reporting and Verification Employees must promptly notify their supervisor on their first day of sick leave and each day after, unless there is mutual agreement to do otherwise. If an employee is in a position where a relief replacement is necessary if they are absent, they will notify their supervisor at least two (2) hours prior to their scheduled time to report to work (excluding leave taken in accordance with the Domestic Violence Act). Unless otherwise precluded by law, the Employer has reason to suspect abuse, the Employer may require a written medical certificate for any sick leave absence. An employee returning to work after any sick leave absence may be required to provide written certification from their health care provider that the employee is able to return to work and perform the essential functions of the job with or without reasonable accommodation.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. B. Grantee shall use the Texas Abuse Hotline Website located at xxxxx://xxx.xxxxxxxxxxxxxx.xxx/Login/Default.aspx as required by the System Agency. Grantee shall retain reporting documentation on site and make it available for inspection by the System Agency.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!