TB Tests & Fingerprinting Sample Clauses

TB Tests & Fingerprinting. 1. The District agrees to pay the full cost for any TB test required as a condition of employment or continuing employment.
AutoNDA by SimpleDocs

Related to TB Tests & Fingerprinting

  • Fingerprinting For purposes of this Agreement and because the District will provide a qualified employee for the supervision of District's students at all times that Consultant is present and performing services at an active school site, Consultant shall be relieved of the requirements to provide a criminal background check pursuant to California Education Code 45125.1.

  • Fingerprinting Requirements Contractor hereby acknowledges that, if applicable, it is required to comply with the requirements of Education Code Section 45125.1 with respect to fingerprinting of employees who may have contact with the District's students. The Contractor shall also ensure that its Contractors on the Project also comply with the requirements of Section 45125.1. If required by Education Code Section 45125.1, the Contractor must provide for the completion of a Fingerprint Certification form, in the District’s required format, prior to any of the Contractor's employees, or those of any other Contractors, coming into contact with the District's students. Contractor further acknowledges that other fingerprinting requirements may apply, as set forth in Education Code Section 45125 et seq., and will comply with any such requirements.

  • Pupil Safety and Fingerprinting CONTRACTOR shall comply with all provisions of the Education Code which protect the safety of any pupil that may come in contact with employees of the CONTRACTOR. Pursuant to Education Code section 45125.1, CONTRACTOR shall conduct criminal background checks of ALL employees of CONTRACTOR assigned to the PROJECT site, and shall certify that no employees who have been convicted of serious or violent felonies, as specified in Education Code Section 45125.1, will have contact with pupils, by utilizing the General Certification Regarding Background Checks Form. As part of such certification, CONTRACTOR must provide the District with a list of all employees providing services pursuant to this Agreement, and designate which sites such employees will be assigned. In performing the services set forth in this Agreement, CONTRACTOR shall not utilize any employees who are not included on the above-referenced list. At District’s sole discretion, District may make a finding, as authorized under Education Code section 45125.1, that CONTRACTOR’s employees will have only “limited contact” with pupils. In accordance with Education Code Section 45125.2, a CONTRACTOR performing construction, reconstruction, rehabilitation or repair services to a school facility shall not be required to perform Section 45125.1 background checks of all employees assigned to the PROJECT site if such CONTRACTOR installs a physical barrier at the worksite to limit employee contact with pupils and/or provides continual supervision and monitoring of all employees of the CONTRACTOR by an employee of the CONTRACTOR whom the Department of Justice has ascertained has not been convicted of a violent or serious felony. Such CONTRACTOR shall certify to the District its compliance with one of the aforementioned alternatives under Education Code Section 45125.2 pertaining to pupil safety with the form entitled CONSTRUCTION CONTRACTOR CERTIFICATION REGARDING BACKGROUND CHECKS which is on file at the Administrative Office of the DISTRICT. Contractor’s failure to comply with the law or Article VI, Paragraph 4 of this Agreement shall be considered a material breach of this Agreement upon where this Agreement may be terminated, at District’s sole discretion, without any further compensation to Contractor.

  • Bibliography [Ben83] Xxxxxxx Xxx-Or. Another advantage of free choice (extended ab- stract): Completely asynchronous agreement protocols. In Proceed- ings of the second annual ACM symposium on Principles of distrib- uted computing, pages 27–30. ACM, 1983. [BG89] Xxxxx Xxxxxx and Xxxx X Xxxxx. Asymptotically optimal distributed consensus. Springer, 1989. [BGP89] Xxxxx Xxxxxx, Xxxx X. Xxxxx, and Xxxxxxx X. Xxxxx. Towards optimal distributed consensus (extended abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989, pages 410–415, 1989. [BT85] Xxxxxxx Xxxxxx and Xxx Xxxxx. Asynchronous consensus and broadcast protocols. Journal of the ACM (JACM), 32(4):824–840, 1985. [DGM+11] Xxxxxxxx Xxxxx, Xxxxxx Xxx Xxxxxxxx, Xxxxxx Xxxxxx, Xxxxxx Xxxxxxxxx, and Xxxxxxxxx Xxxxxxxxxx. Stabilizing Consensus with the Power of Two Choices. In Proceedings of the Twenty-third Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA, June 2011. [DS83] Xxxxx Xxxxx and X. Xxxxxxx Xxxxxx. Authenticated algorithms for byzantine agreement. SIAM Journal on Computing, 12(4):656–666, 1983. [FG03] Xxxxxxxx Xxxxx and Xxxx X Xxxxx. Efficient player-optimal protocols for strong and differential consensus. In Proceedings of the twenty- second annual symposium on Principles of distributed computing, pages 211–220. ACM, 2003.

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Metadata Bibliographical, structural & descriptive data of the Licensed Material as defined in Schedule 5.

  • Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.