State of California Public Liability and Workers’ Compensation Program A. The Judicial Council has elected to be self-insured for its motor vehicle, aircraft liability and general liability exposures. B. The Judicial Council administers workers’ compensation benefits for its employees through a Third Party agreement.
Compliance with Federal and State Work Authorization and Immigration Laws The Contractor and all subcontractors, suppliers and consultants must comply with all federal and state work authorization and immigration laws, and must certify compliance using the form set forth in Section 7 (“Georgia Security and Immigration Compliance Act Affidavits”). The required certificates must be filed with the Owner and copied maintained by the Contractor as of the beginning date of this contract and each subcontract, supplier contract, or consultant contract, and upon final payment to the subcontractor or consultant. State officials, including officials of the Georgia Department of Audits and Accounts, officials of the Owner, retain the right to inspect and audit the Project Site and employment records of the Contractor, subcontractors and consultants without notice during normal working hours until Final Completion, and as otherwise specified by law and by Rules and Regulations of the Georgia Department of Audits and Accounts.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.
WORKPLACE SAFETY AND INSURANCE 41.1 Where an employee is absent by reason of an injury or an occupational disease for which a claim is made under the Workplace Safety and Insurance Act, his or her salary shall continue to be paid for a period not exceeding thirty (30) days. If an award is not made, any payments made under the foregoing provisions in excess of that to which he or she is entitled under Articles 44.1 and 44.6 (Short Term Sickness Plan) shall be an amount owing by the employee to the Employer. 41.2 Where an employee is absent by reason of an injury or an occupational disease for which an award is made under the Workplace Safety and Insurance Act, his or her salary shall continue to be paid for a period not exceeding three (3) consecutive months or a total of sixty-five (65) working days where such absences are intermittent, following the date of the first absence because of the injury or occupational disease, and any absence in respect of the injury or occupational disease shall not be charged against his or her credits. 41.3 Where an award is made under the Workplace Safety and Insurance Act to an employee that is less than the regular salary of the employee and the award applies for longer than the period set out in Article 41.2 and the employee has accumulated credits, his or her regular salary may be paid and the difference between the regular salary paid after the period set out in Article 41.2 and the compensation awarded shall be converted to its equivalent time and deducted from his or her accumulated credits. 41.4 Where an employee receives an award under the Workplace Safety and Insurance Act, and the award applies for longer than the period set out in Article 41.2 (i.e. three (3) months), the Employer will continue subsidies for Basic Life, Long Term Income Protection, Supplementary Health and Hospital and the Dental Plans for the period during which the employee is receiving the award. The Employer shall continue to make the Employer’s pension contributions unless the employee gives the Employer a written notice that the employee does not intend to pay the employee’s pension contributions. 41.5 Where an employee is absent by reason of an injury or an occupational disease for which an award is made under the Workplace Safety and Insurance Act, the employee shall not be entitled to a leave of absence with pay under Article 44 (Short Term Sickness Plan) as an option following the expiry of the application of Article 41.2.
General Allegations The Settling Entity enters into this Settlement Agreement on behalf of the noticed violator described in subsection 1.4 below, with whom such Settling Entity has a contract for one or more of the products at issue which contains indemnity and defense clauses. The Settling Entity has accepted a tender from the noticed violator and approached Xxxxxxx to resolve such violator’s alleged liability. Additionally, the Settling Entity is making commitments in furtherance of the public interest as set forth below. Xxxxxxx alleges that the Settling Entity manufactures, imports, distributes, sells and/or otherwise facilitates for sale in California the lead products defined below, and that it does so without providing the health hazard warning required by Proposition 65 for consumer exposures to lead. Lead is listed pursuant to Proposition 65 as a chemical known to the State of California to cause cancer, and birth defects or other reproductive harm.
Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.
Safety and Protection Where applicable, the PERFORMING PARTY shall be responsible for requiring employees, contractors, and subcontractors to maintain and supervise all necessary safety precautions and programs in connection with the Grant Activities. The PERFORMING PARTY shall take all necessary precautions to protect the health and safety of the public during performance of the Grant Activities.
File Naming Conventions Files will be named according to the following convention: {gTLD}_{YYYY-MM-DD}_{type}_S{#}_R{rev}.{ext} where: {gTLD} is replaced with the gTLD name; in case of an IDN-TLD, the ASCII-compatible form (A-Label) must be used; {YYYY-MM-DD} is replaced by the date corresponding to the time used as a timeline watermark for the transactions; i.e. for the Full Deposit corresponding to 2009-08-02T00:00Z, the string to be used would be “2009-08-02”; {type} is replaced by: “full”, if the data represents a Full Deposit; “diff”, if the data represents a Differential Deposit; “thin”, if the data represents a Bulk Registration Data Access file, as specified in Section 3 of Specification 4; {#} is replaced by the position of the file in a series of files, beginning with “1”; in case of a lone file, this must be replaced by “1”. {rev} is replaced by the number of revision (or resend) of the file beginning with “0”: {ext} is replaced by “sig” if it is a digital signature file of the quasi-homonymous file. Otherwise it is replaced by “ryde”.
SAFETY AND PROTECTION OF PROPERTY The Contractor shall at all times: A. Initiate, maintain and supervise all safety precautions and programs in connection with its services or performance of its operations under this contract. B. Take all reasonable precautions to prevent injury to employees, including County employees and all other persons affected by their operations. C. Take all reasonable precautions to prevent damage or loss to property of Orange County, or of other Contractors, consultants or agencies and shall be held responsible for replacing or repairing any such loss or damage. D. Comply with all ordinances, rules, regulations, standards and lawful orders from authority bearing on the safety of persons or property or their protection from damage, injury or loss. This includes but is not limited to: o Occupational Safety and Health Act (OSHA) o National Institute for Occupational Safety & Health (NIOSH) o National Fire Protection Association (NFPA) o American Society of Heating, Refrigeration & Air-Conditioning Engineers (ASHRAE) E. The Contractor shall also comply with the guidelines set forth in the Orange County Safety & Health Manual. The manual can be accessed online at the address listed below:
Workplace Safety and Insurance Act It is understood that payment of income protection is for the sole and only purpose of protecting employees against the loss of income during time of such illness. Seniority and service will accrue and the Employer shall continue to pay its share of the premium for the benefit plans during the period of the income protection noted in this provision.