Use of CTO Sample Clauses

Use of CTO. At such time as vacation benefit is exhausted, the employee may use CTO time at the discretion of the County until such time as any accumulated CTO time is exhausted. Such charges against accrued CTO time shall be on the same formula set for the in paragraph 19.1, above.
AutoNDA by SimpleDocs
Use of CTO. Use of CTO shall be governed by the rules used for taking of vacation.
Use of CTO. Employees who wish to use CTO must obtain prior authorization of their Supervisor or Department Head. The City's policy is to permit the use of CTO within a reasonable period after the request for use is made. Use of CTO on the specific dates requested by an employee will be permitted as much as reasonably practicable taking into account the operational needs of the department. To facilitate scheduling, employees are encouraged to provide as much advance notice as possible of the dates they desire to use CTO.
Use of CTO. CTO must be taken on a date mutually agreed upon by the employee and the Director, with due consideration given to the efficient operation of the Department and the current departmental workload. In cases where an employee has accumulated more than two hundred (200) hours of CTO and the parties are unable to reach mutual agreement on dates the employee will take CTO, the Director may, upon reasonable notice to the employee, specify the date(s) on which the employee must take earned CTO. Such directed days off must be scheduled in conjunction with other regularly scheduled days off subject to the needs of the Department. The Director may not unreasonably deny employee requests for CTO. On January 1st of each year, employees who have in excess of 150 hours of accumulated compensatory time hours may request in writing a straight time payment in cash, on a one time yearly basis. The University shall make the resulting payment during the following regular pay period.
Use of CTO. An employee may use CTO by requesting such time off and having it approved in advance. A supervisor may require an employee to utilize any CTO bank before granting the use of annual leave.

Related to Use of CTO

  • Use of Cookies 5.1 We use cookies to ensure that our website works effectively and to support your trading activities. Cookies are small text files sent from our web server to your computer. Our cookies do not contain any personal data, account numbers, or passwords. 5.2 We may enlist outside organizations to help us manage the website and collect and analyze statistical data. These outside organizations may install and use their own cookies on our behalf.

  • Use of PTO A nurse will be required to take his or her accrued PTO during the leave, except where required by law. a. Notwithstanding the foregoing, for absences greater than thirty (30) days, a nurse will be allowed to leave up to eighty (80) accrued hours remaining in his/her PTO bank. Such a nurse shall designate to the Medical Center, prior to the announcement of such absence, the date by which compensation for PTO is to be discontinued. b. The number of hours of PTO used per week during the leave may not be less than the number of hours that the nurse was regularly scheduled to work.

  • Use of Card PIN 1.1. RECEIPT OF CARD/PIN Once your application for a Card is approved, we shall send you a Card and a Personal Identification Number (PIN) to be used in conjunction with your Card. Please sign your Card upon receiving it.

  • Use of websites (a) The Guarantor may satisfy its obligation to deliver any public information to the Lenders by posting this information onto an electronic website designated by the Guarantor and the Administrative Agent (the “Designated Website”) by notifying the Administrative Agent (i) of the address of the website together with any relevant password specifications and (ii) that such information has been posted on the website; provided, that in any event the Guarantor shall supply the Administrative Agent with one copy in paper form of any information which is posted onto the website. (b) The Administrative Agent shall supply each Lender with the address of and any relevant password specifications for the Designated Website following designation of that website by the Guarantor and the Administrative Agent. (c) The Guarantor shall promptly upon becoming aware of its occurrence notify the Administrative Agent if: (i) the Designated Website cannot be accessed due to technical failure; (ii) the password specifications for the Designated Website change; (iii) any new information which is required to be provided under this Guaranty is posted onto the Designated Website; (iv) any existing information which has been provided under this Guaranty and posted onto the Designated Website is amended; or (v) the Guarantor becomes aware that the Designated Website or any information posted onto the Designated Website is or has been infected by any electronic virus or similar software. If the Guarantor notifies the Administrative Agent under Section 8.3(c)(i) or Section 8.3(c)(v) above, all information to be provided by the Guarantor under this Guaranty after the date of that notice shall be supplied in paper form unless and until the Administrative Agent is satisfied that the circumstances giving rise to the notification are no longer continuing.

  • Use of the Software licensed hereunder may require third party software or hardware (including but limited to databases, operating systems and servers). Unless specifically licensed in the Master Agreement, this Agreement does not contain a license to use such additional materials.

  • Use of Logos The Company hereby consents to the use of its and its Subsidiaries’ logos in connection with the Debt Financing so long as such logos (i) are used solely in a manner that is not intended to or likely to harm or disparage the Company Group or the reputation or goodwill of the Company Group; (ii) are used solely in connection with a description of the Company, its business and products or the Merger; and (iii) are used in a manner consistent with the other terms and conditions that the Company reasonably imposes.

  • Use of First Samples Drawn For the purposes of all samples (Discovery Sample(s) and Full Sample(s)) discussed in this Appendix, the Paid Claims selected in each first sample shall be used (i.e., it is not permissible to generate more than one list of random samples and then select one for use with the Discovery Sample or Full Sample).

  • Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors. (b) If the employer decides to engage subcontractors, the employer shall ensure that these contractors and their employees receive wages, allowances and conditions equal to or better than those contained in this agreement. (c) The use of sham sub contracting arrangements is a breach of this agreement. The contractor who engages subcontractors is responsible for ensuring the employees of sub- contractors receive wages, allowances and conditions equal to or better those contained in this agreement, this obligation extends to liability for all outstanding wages conditions and entitlements under this agreement.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!