Verbal Abuse and Vulgar or Lewd Conduct Sample Clauses

Verbal Abuse and Vulgar or Lewd Conduct. Students who direct verbal abuse at an employee or who engage in vulgar or lewd conduct in the presence of an employee shall be disciplined according to District policy. The employee may request that the student be removed from the employee’s classroom. Communications from threatening parents shall be restricted. Conferences with threatening parents shall be conducted under safe supervision at the worksite.
AutoNDA by SimpleDocs

Related to Verbal Abuse and Vulgar or Lewd Conduct

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Business Conduct Merger Sub was incorporated on November 5, 2020. Since its inception, Merger Sub has not engaged in any activity, other than such actions in connection with (a) its organization and (b) the preparation, negotiation and execution of this Agreement and the Transactions. Merger Sub has no operations, has not generated any revenues and has no assets or liabilities other than those incurred in connection with the foregoing and in association with the Merger as provided in this Agreement.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • No Felony Criminal Convictions Contractor represents that neither Contractor nor any of its employees, agents, or representatives, including any subcontractors and employees, agents, or representative of such subcontractors, have been convicted of a felony criminal offense or that if such a conviction has occurred Contractor has fully advised System Agency in writing of the facts and circumstances surrounding the convictions.

  • Anti-­‐Abuse Registry Operator may suspend, delete or otherwise make changes to domain names in compliance with its anti-­‐abuse policy.

  • Ethical Conduct Seller's employees shall comply with the BorgWarner Supplier Code of Conduct articulated within the BorgWarner Supplier Manual. Compliance with these standards is a mandatory component of Buyer's purchase contracts worldwide and must also apply to Seller subcontractors. Both, the BorgWarner Supplier Code of Conduct and the BorgWarner Supplier Manual are incorporated by reference as part of the Purchase Order, are binding on the Seller, and Seller explicitly verifies to have read and accepted the BorgWarner Supplier Code of Conduct and the BorgWarner Supplier Manual.

  • General Conduct The BSC has specific policies governing conduct in the units, including, but not limited to, assault, harassment, sexual harassment, host, alcohol, party and substance abuse policies. Member agrees to read and abide by these policies. Failure to follow BSC conduct policies will lead to a range of sanctions up to and including termination of this contract and BSC membership.

  • Visitors to and Conduct on School Property Petitions or written correspondence to the Board shall be presented to the Board in the next regular Board packet. LEGAL REF.: 5 ILCS 120/2.06, Open Meetings Act. 105 ILCS 5/10-6 and 5/10-16. CROSS REF.: 2:220 (School Board Meeting Procedure), 8:10 (Connection with the Community), 8:30 (Visitors to and Conduct on School Property) Adopted: September 5, 2019 Meridian CUSD 223 2:240 Board Policy Development The School Board governs using written policies. Written policies ensure legal compliance, establish Board processes, articulate District ends, delegate authority, and define operating limits. Board policies also provide the basis for monitoring progress toward District ends. Policy Development Anyone may propose new policies, changes to existing policies, or elimination of existing policies. Staff suggestions should be processed through the Superintendent. Suggestions from all others should be made to the Board President or the Superintendent. A Board Policy Committee will consider all policy suggestions, and provide information and recommendations to the Board. The Superintendent is responsible for: (1) providing relevant policy information and data to the Board,

  • Access to Protected Health Information 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524.

Time is Money Join Law Insider Premium to draft better contracts faster.