DESCRIPTORS Lecturing Sample Clauses

DESCRIPTORS Lecturing. For the purposes of this Schedule, the term ‘lecture’ means any education delivery (regardless of teaching mode) described as a lecture in a course or topic outline, or in any official timetable issued by the University. LEC03 Is paid to a distinguished scholar who is an expert in their field and gives a single lecture or a small group of lectures. Rate assumes one (1) hour delivery and up to three (3) hour’s preparation work. Repeat delivery of substantially the same lecture within seven days is paid at the LD1 hourly rate. LEC02 Is paid where the lecturer assumes significant responsibility for planning and developing, or reviewing and revising a topic or a large part of a topic, as well as lecturing. Rate assumes one
AutoNDA by SimpleDocs

Related to DESCRIPTORS Lecturing

  • Exit Planning 6. The Grant Recipient will, in conjunction with the Authority, maintain, and as necessary update, the Exit Plan throughout the Funding Period so that it can be implemented immediately, if required. From time-to-time either the Authority or the Grant Recipient may instigate a review of the Exit Plan.

  • Strategic Planning Facilitate the effective alignment of IT requirements/ Information Resource Management (IRM) plans with strategic business plans and program initiatives. Management Improvements: Development and implementation of improved systems and business practices to optimize productivity and service delivery operations (e.g., analysis, and implementation of improvements in the flow of IT work and program processes and tool utilization, including business system analysis, identification of requirements for streamlining, re-engineering, or re-structuring internal systems/business processes for improvement, determination of IT solution alternatives, benchmarking).

  • Curriculum Development This includes the analysis and coordination of textual materials; constant review of current literature in the field, some of which are selected for the college library collection, the preparation of selective, descriptive materials such as outlines and syllabi; conferring with other faculty and administration on curricular problems; and, the attendance and participation in inter and intra-college conferences and advisory committees.

  • Staff Development ‌ The County and the Association agree that the County retains full authority to determine training needs, resources that can be made available, and the method of payment for training authorized by the County. Nothing in this subsection shall preclude the right of an employee to request specific training.

  • Topic Description Licensee Responsibilities Licensee must:  Take appropriate steps to ensure the security, integrity, and confidentiality of Confidential Information and must comply with all relevant applicable laws and regulations, including laws protecting borrower privacy.  Not disclose Confidential Information to third parties, without Xxxxxx Mae’s prior written approval, except on a need‐to‐know basis to Licensee’s partners, Topic Description affiliates, officers, employees, directors, contractors, counsels, agents or representatives, provided they are subject to confidentiality obligations at least as stringent as those set forth in this Section A3.  Not use Confidential Information in any way that could be viewed as a conflict of interest, a breach of confidentiality or privacy, or the gaining of an unfair advantage from the relationship with Xxxxxx Xxx.  Implement commercially reasonable measures meeting or exceeding industry standards to ensure the security, integrity, and confidentiality of Confidential Information, including using industry‐standard encryption for data in transit and virus checking programs designed to prevent the transmission and receipt of viruses and other malicious code, implementing appropriate disaster recovery and back‐up procedures, implementing appropriate procedures to prevent disclosure of data and other materials to a party other than the intended recipient, and employing methods for securely disposing or destroying such information.  These measures must meet, at least, the same level of protection that the Receiving Party seeks for its own information of a similar nature.  Licensee must collaborate with Xxxxxx Mae in assessing the sufficiency of these measures and Licensee’s information security program, upon reasonable request.  Instruct its Related Parties who may receive Confidential Information about the requirements of this Section A3, and the processes and procedures necessary to comply with them.  Comply with all reasonable security policies and procedures required by Xxxxxx Xxx related to the access and use of Xxxxxx Mae’s systems or any Licensed Materials.  Not transmit to Xxxxxx Mae’s systems any materials that contain bugs, viruses, worms or other functions, routines, devices or instructions which may create any unauthorized access or damage to, or interruption in the functioning of, the Licensed Application or Xxxxxx Mae’s systems. Restrictive Legends  Licensee must abide by and reproduce and include any restrictive legend or proprietary rights notice that appears in or on any Confidential Information of Xxxxxx Xxx or any Third‐Party Licensor (or other third‐party owner) that it is authorized to reproduce.  Licensee also agrees that it will not remove, alter, cover or distort any trademark, trade name, copyright or other proprietary rights notices, legends, symbols or labels appearing on or in any Confidential Information of Xxxxxx Mae or any Third‐Party Licensor (or other third‐party owner). Required Actions in Case of Data Breach  Licensee must address any Data Breach with prompt and effective corrective action, including cooperation with Xxxxxx Xxx in the investigation and remediation of such Data Breach, as well as prompt disclosure and notification where legally required; and  Licensee must promptly notify Xxxxxx Mae of any Data Breach in writing ‐‐ at xxxxxxx_xxxxxxxxxxxx@xxxxxxxxx.xxx ‐‐ and must take all steps reasonably requested by Xxxxxx Xxx to mitigate the consequences of such Data Breach.

  • TEACHING AND LEARNING This component captures institutional strengths in program delivery methods that expand learning options for students, and improve their learning experience and career preparedness. This may include, but is not limited to, experiential learning, online learning, entrepreneurial learning, work integrated learning, and international exchange opportunities.

  • Scope of Cooperation 1. The Authorities recognise the importance of close communication concerning the Covered CCPs and intend to cooperate regarding:

  • Procurement Planning Prior to the issuance of any invitations to bid for contracts, the proposed procurement plan for the Project shall be furnished to the Association for its review and approval, in accordance with the provisions of paragraph 1 of Appendix 1 to the Guidelines. Procurement of all goods and works shall be undertaken in accordance with such procurement plan as shall have been approved by the Association, and with the provisions of said paragraph 1.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

Time is Money Join Law Insider Premium to draft better contracts faster.