Control Room Operators Sample Clauses

Control Room Operators. A Control Room Operator is an employee who possesses the necessary skill, knowledge and experience to carry out their duties as described in the position description.
AutoNDA by SimpleDocs
Control Room Operators. University Security Team Leaders and University Security Officers working on a shift roster, work on public holidays. Gardeners and Horticulturalists and Horticulturalist Team Leaders are not required to work public holidays unless agreed in writing.
Control Room Operators. Ordinary hours may be as long as 12.5 or as short as three (3) on any one (1) day or shift.
Control Room Operators. Principal Control Room Operators shall work specified shifts on a three week roster and which will average forty hours per week over the duration of each three week cycle of the roster, inclusive of the crib rest breaks. Team shift Control Room Operators shall if rostered work specified shifts of the five week roster, inclusive of the crib rest breaks. All rostered shifts worked will be paid at ordinary rates.
Control Room Operators. Day shift only The Introduction of the three week roster will be phased in through a selection process. Those control room operators who are selected and agree will work the three week roster and attract its associated hours of work and overtime provisions. Other control room operators will retain the 5 week roster and its associated conditions. Control Room Operators (Day Shift) shall work specified shifts on a three week roster and which will average forty hours per week over the duration of each three week cycle of the roster. Each shift shall be one of either eight, nine or twelve hours paid at ordinary rates, inclusive of the crib rest breaks, as per the roster.
Control Room Operators. (Day Shift) who work in excess of eight, nine or twelve ordinary hours in each shift (inclusive of a paid 30 minute crib break) shall be eligible for overtime at the relevant overtime rate, for each hour worked in excess of the ordinary, eight, nine or twelve hours.

Related to Control Room Operators

  • Verizon OSS Facilities Any gateways, interfaces, databases, facilities, equipment, software, or systems, used by Verizon to provide Verizon OSS Services to CBB.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Operators Any and all Operators of the Equipment shall be duly experienced, trained and qualified to operate Equipment of this type. Although We may, from time to time, recommend certain qualified Operators with whom We are familiar, We do not supply Operators. You must supply and employ any Operator who operates the Equipment (even if the Operator is the owner of the Equipment or owner of a company that owns the Equipment) and that Operator shall be deemed to be Your employee and acting under Your supervision or control for all purposes and shall be covered as an insured on all of Your applicable insurance policies.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Quality Management Grantee will:

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Change Management BellSouth provides a collaborative process for change management of the electronic interfaces through the Change Control Process (CCP). Guidelines for this process are set forth in the CCP document as amended from time to time during this Agreement. The CCP document may be accessed via the Internet at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain all summerfallow in a reasonably weed-free condition.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

Time is Money Join Law Insider Premium to draft better contracts faster.