Policies and Processes Sample Clauses

Policies and Processes. The CCHH Provider shall have policies and processes in place to ensure compliance with Federal and State requirements and shall have documentation of policies and processes readily available.
Policies and Processes. Password Construction Guidelines Overview Passwords are a critical component of information security. Passwords serve to protect user accounts; however, a poorly constructed password may result in the compromise of individual systems, data, or network. This guideline provides best practices for creating secure passwords.
Policies and Processes. Armis has developed and implemented a range of documented policies, standards, programs and processes in support of its overall data security program. These include, but not limited to, employee security training process; employee background checks; incoming and departing employees access and related data protection process; access control policy and processes; product vulnerability management and penetration testing, reporting and remediation process; business continuity and disaster recovery process; security incident management standard; confidentiality documentation policy; vulnerability and patch management standards; mobile devices policy; removable media policy; acceptable encryption standard; vendor risk management standard; configuration management standard; data handling policy; media destruction policy, data classification and handling standard, etc.
Policies and Processes. Password Construction Guidelines Definition and Terms The following definition and terms can be found in the SANS Glossary located at xxxxx://xxx.xxxx.xxx/security- resources/glossary-of-terms/ • Simple Network Management Protocol (SNMP) Password Construction Guidelines Overview Passwords are a critical component of information security. Passwords serve to protect user accounts; however, a poorly constructed password may result in the compromise of individual systems, data, or network. This guideline provides best practices for creating secure passwords.
Policies and Processes. Please review the following policies for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of PrimeGov’s network: • Password Protection Policy • Acceptable Use Policy
Policies and Processes. In carrying out its obligations under Clauses 4.1, 4.2 and 4.3, the parties will meet and determine the Operating Manuals, policies and procedures related to the efficient operation of the Hotel. The OPERATOR shall have the right to propose and determine with the advice of OWNER the Policies and Procedures. Notwithstanding to the generality of the foregoing, subject to the Annual Budget, the OPERATOR shall have the right to determine the policies and procedures in respect of all matters including but not limited to the following:-

Related to Policies and Processes

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Ordering Guidelines and Processes 2.1.10.1 For information regarding Ordering Guidelines and Processes for various UNEs, ONS should refer to the “Guides” section of the BellSouth Interconnection website, which is incorporated herein by reference, as amended from time to time. The website address is: xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Good Shepherd shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.