Differing Terminology and Approaches Clause Samples

Differing Terminology and Approaches. It is important to clarify the differing terminology and approaches used by education and law enforcement in order to avoid confusion. First, although harassment, intimidation and bullying (HIB) is defined in the “Anti-Bullying Bill of Rights Act,” there is no such definition in the New Jersey Code of Criminal Justice, and there is no criminal offense of “bullying” that can be charged or prosecuted as juvenile delinquency. In order for a law enforcement agency to investigate or prosecute a course of conduct that constitutes “bullying” there must be conduct that violates one or more provisions of the Code of Criminal Justice. Common bullying offenses include assault, harassment, threats, robbery and sexual offenses. However, HIB can exist without conduct that rises to the level of a violation of the Code of Criminal Justice. Furthermore, in investigating HIB under the “Anti-Bullying Bill of Rights Act” schools are not bound by the “beyond a reasonable doubtstandard of proof that is required in criminal or juvenile delinquency proceedings. Law enforcement investigations must focus on determining whether conduct violates one or more sections of the Code of Criminal Justice. School investigations of HIB must determine whether conduct meets the definition of HIB that is set forth in the “Anti-Bullying Bill of Rights Act.” (N.J.S.A. 18A:37-14.)
Differing Terminology and Approaches. 36 8.6.2 Definition of Harassment, Intimidation or Bullying 36 8.6.3 Consultations Regarding Adoption of Policy 37 8.6.4 Information Sharing; Obligation to Report Offenses and Preserve Evidence 37 8.6.4.1 Disclosing Reports of Bullying to Schools 37 8.6.4.2 Reporting Harassment, Intimidation or Bullying to Law Enforcement 37 8.6.4.3 Preservation of Evidence; Chain of Custody 38 8.6.5 Coordination of Investigations 38

Related to Differing Terminology and Approaches

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • ADDITIONAL THIRD PARTY TERMS The following terms apply in addition to the Agreement:

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code. (b) Unless and until the Bank receives such written notice of disclosure, the Account Holder shall be fully liable and be bound by all transactions effected by the use of such TBS, with or without his consent or knowledge.

  • WHO WILL BE MADE AWARE OF THE INFORMATION DISCLOSED ON THE SPR AND ANY UPDATES?

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.