Xxxxx and Breaks Sample Clauses

Xxxxx and Breaks. To the extent feasible, management will continue existing lunch and break arrangements. Employees will not be required to sign-in/sign-out for breaks.
AutoNDA by SimpleDocs
Xxxxx and Breaks. To the extent feasible, Management will continue existing lunch and break arrangements. Normally, employees will not be required to sign in and sign out for breaks and lunches. If Management decides to establish a shift two, the following lunch and break provisions will apply: • Employees who report to work before 8:00 am must take their breaks between 9:45 am and 10:30 am and between 1:30 pm and 2:15 pm. These employees must take their lunch period between 11:00 am and 12:30 pm. Employees working the 4/40 FWA must take their lunch period between 11:30 am and 1:00 pm. • Employees who report to work at 8:00 am or later must take their breaks between 10:30 am and 11:15 am and between 2:15 pm and 3:00 pm. These employees must take their lunch period between 12:30 pm and 2:00 pm. • Management may approve an employee’s request to change his/her break and/or lunch period for a day or for a longer period.

Related to Xxxxx and Breaks

  • Xxxxxx and Recall An employee in receipt of notice of layoff pursuant to 9.08(A)(a)(ii) may:

  • Working and Labor Synergies The Contractor shall be responsible for maintaining a tranquil working relationship between the Contractor work force, the Contractor Parties and their work force, State employees, and any other contractors present at the work site. The Contractor shall quickly resolve all labor disputes which result from the Contractor's or Contractor Parties’ presence at the work site, or other action under their control. Labor disputes shall not be deemed to be sufficient cause to allow the Contractor to make any claim for additional compensation for cost, expenses or any other loss or damage, nor shall those disputes be deemed to be sufficient reason to relieve the Contractor from any of its obligations under the Contract.

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Xxxxxxxx and X X. Xxxxx. 1930. Checklist of the fishes and fishlike vertebrates of North and Middle America north of the northern boundary of Venezuela and Columbia. Rept. U.S. Fish Comm. 1928(2):1-670. Jordan, D.S. and X.X. Xxxxxxxx. 1896. The fishes of North and Middle America. Part 1. U.S. Natl. Mus. Bul. 47:1-1240. Xxxxx, S. and X. Xxxxxx. 2005..Hydrogeologic setting of the snake valley hydrologic basin, Xxxxxxx County, Utah, and White Pine and Lincoln Counties, Nevada – implications for possible effects of proposed water xxxxx. Report of investigation 254, Utah Geological Survey. Xxxxxxx, M.C. 1982. Status report of three Bonneville basin endemic fishes. Prepared for the U.S. Fish and Wildlife Service. 27 pp. May, B. E. and X. X. Xxxxx. 1981. Comparative effects of sheep and cattle grazing on the Xxxxx Creek drainage. Transactions of the Bonneville Chapter American Fisheries Society. 1981:48-62. Xxxxx, X.X. 1985. Predation and species replacement in American Southwestern fishes: a case study. Southwestern Naturalist. 30:173-187. Xxxxxx, X. X. and X. X. Xxxxxx. 1985. Two New Intergeneric Cyprinid Hybrids from the Bonneville Basin, Utah. Copeia, 1985(2):509-515. Xxxxxx, X.X. 1972. Threatened freshwater fishes of the United States. Trans. Amer, Fish. Soc. 101(2):239-252.

  • Demotion and Layoff 10:1 In the event reduction of forces or curtailment of operation shall occur, employees shall be laid off in the reverse order of their Company seniority in the area in which they are working at the time of the reduction. The application of this Section to an employee working temporarily in an area shall apply only to the extent that it affects him/her in his/her regular area.

  • Xxxxx and X Xxxxxxxxxx. Non-Commutative Geometry, Non- Associative Geometry and the Standard Model of Particle Physics, 1401.5083.

  • Xxxxxxxxx and X Xxxxxxx. A

  • HOOSIER HEALTHWISE SCOPE OF WORK  Requirements for Reinsurance Companies  The Contractor shall submit documentation that the reinsurer follows the National Association of Insurance Commissioners' (NAIC) Reinsurance Accounting Standards.  The Contractor shall be required to obtain reinsurance from insurance organizations that have Standard and Poor's claims- paying ability ratings of "AA" or higher and a Xxxxx’x bond rating of “A1” or higher, unless otherwise approved by OMPP.  Subcontractors  Subcontractors’ reinsurance coverage requirements must be clearly defined in the reinsurance agreement.  Subcontractors should be encouraged to obtain their own stop-loss coverage with the above-mentioned terms.  If subcontractors do not obtain reinsurance on their own, the Contractor is required to forward appropriate recoveries from stop- loss coverage to applicable subcontractors.

  • Incident Reporting and Client Risk Prevention An incident report shall be created and maintained at the AGENCY for the following: in the event the AGENCY’S staff or subcontractor becomes aware of an occurrence of any incident of injury to a client receiving program services through the COUNTY, requiring medical treatment by a licensed physician; any lawsuit entered into or against the AGENCY, all allegations of any kind of abuse, neglect, or exploitation of the AGENCY’S clients with the exception of those AGENCIES whose primary function is working with those that have been abused, neglected or exploited unless the allegation is against an AGENCY staff member; media coverage relating to the media expressing an interest in a case or issue concerning a client of the AGENCY or an employee on the AGENCY premises, a fire, hostage situation, bomb threat, epidemic or any circumstance which may impact the service provision. All occurrences shall be verbally communicated directly to COUNTY staff no later than 10:00 a.m. the following business day via telephone to the COUNTY. All incident reports shall be made available to the COUNTY upon request and maintained at the AGENCY. These reporting requirements shall in no way supersede the requirements for notification of allegations of abuse/neglect/exploitations to the State of Florida Abuse Hotline, as mandated in Chapter(s) 39 and 415, Florida Statutes.

Time is Money Join Law Insider Premium to draft better contracts faster.