Expensive Personal Items Sample Clauses

Expensive Personal Items. Uniform damage claims for expensive personal items are subject to reimbursement at an amount less than the replacement cost.
AutoNDA by SimpleDocs

Related to Expensive Personal Items

  • Personal Items In accordance with Departmental policy, employees will be reimbursed for personal items required on the job that are lost, damaged or destroyed in the line of duty. Reimbursement will be up to an amount of $100 per occurrence, excluding prescription eyewear.

  • Personal Illness Employees may use accumulated sick leave for hours off due to personal illness. The employee may be required to furnish a medical certificate from a qualified physician as evidence of illness or physical disability in order to qualify for paid sick leave as per District practice. Accumulated sick leave may also be granted for such time as is actually necessary for office visits to a doctor, dentist, optometrist, etc.

  • Protecting Your Personal Information In addition to protecting your access codes, you should also take precautions to protect your personal identification information, such as your driver’s license, Social Security number, or tax identification number. This information by itself or together with account information may allow unauthorized access to your accounts. You should treat personal information with the same level of care that you would for your account information. You should also protect and secure all information and data stored in any personal computer or other equipment you use to access our Online Banking service.

  • Personal Belongings Tenant agrees not to leave any personal belongings (including lawn furniture) in the parking areas, common halls, sidewalks, lawn areas or other common areas of the apartment community.

  • Overload Teaching Paragraph 1: Overload teaching is that teaching conducted by a full-time classroom teacher teaching daily in a vacant position during his/her planning period.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Users Licensee is responsible for each User’s compliance with this XXXX. Licensee will ensure that all use of the Software by Users is in accordance with the terms of this XXXX.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • Personal Information 23.1 Subject to any applicable laws, the Licensee authorises XXXXX to:

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

Time is Money Join Law Insider Premium to draft better contracts faster.