Outpatient emergency and urgicenter services within the service area The emergency room copay applies to all outpatient emergency visits that do not result in hospital admission within twenty-four (24) hours. The urgicenter copay is the same as the primary care clinic office visit copay.
Restricted Employment for Certain State Personnel Contractor acknowledges that, pursuant to Section 572.069 of the Texas Government Code, a former state officer or employee of a state agency who during the period of state service or employment participated on behalf of a state agency in a procurement or contract negotiation involving Contractor may not accept employment from Contractor before the second anniversary of the date the Contract is signed or the procurement is terminated or withdrawn.
Student Supervision 2. Central Issues as they affect Occasional Teacher Workload
Level Two - Superintendent of Schools a. If an aggrieved person is not satisfied with the decision concerning his/her grievance at Level One, he/she may, within three (3) days after the decision is rendered or within eight (8) days after his/her formal presentation, file his/her grievance with the Superintendent.
Red Hat Enterprise Linux Developer Suite Red Hat Enterprise Linux Developer Suite provides an open source development environment that consists of Red Hat Enterprise Linux with built-in development tools, certain Red Hat Enterprise Linux Add-Ons, Red Hat Enterprise Linux for Real Time, Smart Management and access to Software Maintenance, but no Development or Production Support. If you use any of the Subscription Services or Software associated with Red Hat Enterprise Linux Developer Suite for Production Purposes, or use the Red Hat Enterprise Linux Software Subscription entitlement independently, you agree to purchase the applicable number of Units of the applicable Software Subscription. Red Hat does not provide Production Support or Development Support for Red Hat Enterprise Developer Suite.
Office Space for Receiver and Corporation For the period commencing on the day following Bank Closing and ending on the one hundred eightieth (180th) day thereafter, the Assuming Bank agrees to provide to the Receiver and the Corporation, without charge, adequate and suitable office space (including parking facilities and vault space), furniture, equipment (including photocopying and telecopying machines), email accounts, network access and technology resources (such as shared drive) and utilities (including local telephone service and fax machines) at the Bank Premises occupied by the Assuming Bank for their use in the discharge of their respective functions with respect to the Failed Bank. In the event the Receiver and the Corporation determine that the space provided is inadequate or unsuitable, the Receiver and the Corporation may relocate to other quarters having adequate and suitable space and the costs of relocation and any rental and utility costs for the balance of the period of occupancy by the Receiver and the Corporation shall be borne by the Assuming Bank. Additionally, the Assuming Bank agrees to pay such bills and invoices on behalf of the Receiver and Corporation as the Receiver or Corporation may direct for the period beginning on the date of Bank Closing and ending on Settlement Date. Assuming Bank shall submit it requests for reimbursement of such expenditures pursuant to Article VIII of this Agreement.
Supervision of Contractor Personnel The Contractor must supply all necessary and sufficient supervision over the work that is being performed and will be held solely responsible for the conduct and performance of his employees or agents involved in work under the Agreement.
Service Jointly Provisioned with an Independent Company or Competitive Local Exchange Company Areas 4.5.1 BellSouth will in some instances provision resold services in accordance with the General Subscriber Services Tariff and Private Line Tariffs jointly with an Independent Company or other Competitive Local Exchange Carrier.
Time Off for Union Business Leave of absence without pay and without loss of seniority will be granted:
COMPETENT SUPERVISORY AUTHORITY Identify the competent supervisory authority/ies in accordance with Clause 13 … ANNEX II - TECHNICAL AND ORGANISATIONAL MEASURES INCLUDING TECHNICAL AND ORGANISATIONAL MEASURES TO ENSURE THE SECURITY OF THE DATA EXPLANATORY NOTE: The technical and organisational measures must be described in specific (and not generic) terms. See also the general comment on the first page of the Appendix, in particular on the need to clearly indicate which measures apply to each transfer/set of transfers. Description of the technical and organisational measures implemented by the data importer(s) (including any relevant certifications) to ensure an appropriate level of security, taking into account the nature, scope, context and purpose of the processing, and the risks for the rights and freedoms of natural persons. [Examples of possible measures: • Measures of pseudonymisation and encryption of personal data • Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services • Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident • Processes for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures in order to ensure the security of the processing • Measures for user identification and authorisation • Measures for the protection of data during transmission • Measures for the protection of data during storage • Measures for ensuring physical security of locations at which personal data are processed • Measures for ensuring events logging • Measures for ensuring system configuration, including default configuration • Measures for internal IT and IT security governance and management • Measures for certification/assurance of processes and products • Measures for ensuring data minimisation • Measures for ensuring data quality • Measures for ensuring limited data retention • Measures for ensuring accountability • Measures for allowing data portability and ensuring erasure]