UNION SECURITY, BULLETIN BOARDS AND ACCESS Sample Clauses

UNION SECURITY, BULLETIN BOARDS AND ACCESS. Section 3.1. Union Security
AutoNDA by SimpleDocs
UNION SECURITY, BULLETIN BOARDS AND ACCESS. Payroll Deduction 1. The Union shall certify to AHS in writing the dues required for Union membership. Any changes in the dues rate amounts to be deducted for Union dues shall be certified to AHS, in writing, at least thirty (30) calendar days prior to the effective date of such change. 2. Deductions for dues, COPE or other Union-sponsored program shall start the pay period after AHS receives notification from the Union of the authorization to make such deductions. 3. AHS shall transmit such payments to the Union through electronic funds transfer no later than thirty (30) days after the deduction from the employee’s earnings occurs.

Related to UNION SECURITY, BULLETIN BOARDS AND ACCESS

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • Aviation Security 1. In accordance with their rights and obligations under international law, the Parties reaffirm that their obligation to each other to protect the security of civil aviation against acts of unlawful interference forms an integral part of this Agreement. Without limiting the generality of their rights and obligations under international law, the Parties shall in particular act in conformity with the provisions of the Convention on Offenses and Certain Other Acts Committed on Board Aircraft, done at Tokyo September 14, 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague December 16, 1970, the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done at Montreal September 23, 1971, and the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, done at Montreal February 24, 1988. 2. The Parties shall provide upon request all necessary assistance to each other to prevent acts of unlawful seizure of civil aircraft and other unlawful acts against the safety of such aircraft, of their passengers and crew, and of airports and air navigation facilities, and to address any other threat to the security of civil air navigation. 3. The Parties shall, in their mutual relations, act in conformity with the aviation security standards and appropriate recommended practices established by the International Civil Aviation Organization and designated as Annexes to the Convention; they shall require that operators of aircraft of their registry, operators of aircraft who have their principal place of business or permanent residence in their territory, and the operators of airports in their territory act in conformity with such aviation security provisions. 4. Each Party agrees to observe the security provisions required by the other Party for entry into, for departure from, and while within the territory of that other Party and to take adequate measures to protect aircraft and to inspect passengers, crew, and their baggage and carry-on items, as well as cargo and aircraft stores, prior to and during boarding or loading. Each Party shall also give positive consideration to any request from the other Party for special security measures to meet a particular threat. 5. When an incident or threat of an incident of unlawful seizure of aircraft or other unlawful acts against the safety of passengers, crew, aircraft, airports or air navigation facilities occurs, the Parties shall assist each other by facilitating communications and other appropriate measures intended to terminate rapidly and safely such incident or threat. 6. When a Party has reasonable grounds to believe that the other Party has departed from the aviation security provisions of this Article, the aeronautical authorities of that Party may request immediate consultations with the aeronautical authorities of the other Party. Failure to reach a satisfactory agreement within 15 days from the date of such request shall constitute grounds to withhold, revoke, limit, or impose conditions on the operating authorization and technical permissions of an airline or airlines of that Party. When required by an emergency, a Party may take interim action prior to the expiry of 15 days.

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

  • Custodian or Foreign Securities System The Custodian may hold foreign securities for all of its customers, including the Portfolios, with any Foreign Sub-Custodian in an account that is identified as belonging to the Custodian for the benefit of its customers, provided however, that (i) the records of the Custodian with respect to foreign securities of the Portfolios which are maintained in such account shall identify those securities as belonging to the Portfolios and (ii), to the extent permitted and customary in the market in which the account is maintained, the Custodian shall require that securities so held by the Foreign Sub-Custodian be held separately from any assets of such Foreign Sub-Custodian or of other customers of such Foreign Sub-Custodian.

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Special Permit from Relevant Ministerial/ Government Agencies and Foreign Capital Ownership Limitation Raw Material for Explosives (Ammonium Nitrate) with maximum foreign equity ownership of 49% and a special permit from the Minister of Defense (ISIC 2411) Industry of explosive materials and its components for industry need with maximum foreign equity ownership of 49% and a special permit from the Minister of Defense (ISIC 2429) Sugar Industry (Xxxxx Xxxxxxx Sugar, Refined Crystal Sugar and Raw Crystal Sugar) with maximum foreign equity ownership of 95% and a special permit from the Minister of Industry and the Minister of Agriculture, and it has to be integrated with the sugar plantation. The manufacturing of raw crystal sugar is required for any sugar manufacturer with sugarcane input capacity exceeding 8000 tons per day (ISIC 1542) Processing of plantation product industry (similar capacity or exceeding a certain capacity, according to Regulation of Minister of Agriculture Number 26 of 2007 with maximum foreign capital ownership of 95% with a special permit from Minister of Agriculture. - Fiber and Seed Cotton Industry (ISIC1514, 1711) - Crude oil industry (edible oil) from vegetable and animal, coconut oil industry, palm oil industry, rubber to be sheet, thick latex, crumb rubber industry, raw castor oil industry, sugar, sugar cane and sugar cane residue industry, black tea/green tea industry, dry tobacco leaves industry, Copra, Fiber, Coconut Charcoal, Dust, Nata de coco industry, Coffee sorting, cleaning and peeling industry, Cocoa cleaning, peeling and drying industry, cleaning and peeling seed other than coffee and cacao industry, cashew to be dry seed cashew and Cashew Nut Shell Liquid (CNSL) Industry, Peppercorn to be dry white pepper and dry black pepper industry (ISIC 1514, 2429, 1542, 1549, 1600, 2519, 1531)

  • Inspection and Access Landlord and its agents, representatives, and contractors may enter the Premises at any reasonable time to inspect the Premises and to make such repairs as may be required or permitted pursuant to this Lease and for any other business purpose. Landlord and Landlord’s representatives may enter the Premises during business hours on not less than 48 hours advance written notice (except in the case of emergencies in which case no such notice shall be required and such entry may be at any time) for the purpose of effecting any such repairs, inspecting the Premises, showing the Premises to prospective purchasers and, during the last year of the Term, to prospective tenants or for any other business purpose. Landlord may erect a suitable sign on the Premises stating the Premises are available to let or that the Project is available for sale. Landlord may grant easements, make public dedications, designate Common Areas and create restrictions on or about the Premises, provided that no such easement, dedication, designation or restriction materially, adversely affects Tenant’s use or occupancy of the Premises for the Permitted Use. At Landlord’s request, Tenant shall execute such instruments as may be necessary for such easements, dedications or restrictions. Tenant shall at all times, except in the case of emergencies, have the right to escort Landlord or its agents, representatives, contractors or guests while the same are in the Premises, provided such escort does not materially and adversely affect Landlord’s access rights hereunder.

  • REPORTS AND ACCESS The Advisor agrees to supply such information to the Fund's administrator and to permit such compliance inspections by the Fund's administrator as shall be reasonably necessary to permit the administrator to satisfy its obligations and respond to the reasonable requests of the Trustees.

  • EEA Financial Institution No Loan Party is an EEA Financial Institution.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!