Protection of Children and Young People Sample Clauses

Protection of Children and Young People. On December 8, 2002, the Essential Norms for Dealing with Allegations of Sexual Abuse of Minors were approved by Xxxx Xxxx Xxxx XX. In June of 2005, the Charter and the Norms were revised, and in 2011, the Charter was revised in order to re-affirm the deep commitment of the Church to create a safe environment for children and youth. The Diocese of Joliet first promulgated a policy regarding sexual abuse of minors on June 14, 1990. Revisions were made in September 1993, in June 1997, in June 2003 and July 2008. As with the previous edition, this policy is intended to be in conformity with provisions from the Charter for the Protection of Children and Young People and from the Essential Norms for Dealing with Allegations of Sexual Abuse of Minors. This policy is designed to ensure appropriate responses to allegations of sexual abuse of minors and vulnerable adults by clergy, seminarians, religious, employees and volunteers. It addresses preventing sexual abuse through education and screening, reporting abuse, providing pastoral assistance to persons affected by abuse and the processing of allegations. A copy of this policy is to be given to all clergy and seminarians as well as to all employees and volunteers who will sign an acknowledgement of its receipt. The policy is also to be published on the diocesan website.
AutoNDA by SimpleDocs
Protection of Children and Young People. 2.11.1 The Provider will implement a policy and practices for ensuring the protection of children, young people, and vulnerable adults, including appropriate DBS screening of staff working with young children and vulnerable adults

Related to Protection of Children and Young People

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to give all reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Data Protection Officer 10.1 The Data Processor will appoint a Data Protection Officer where such appointment is required by Data Protection Laws and Regulations.

  • JOB FAMILY: APPLICATIONS DEVELOPMENT‌ Job Title: Director, Systems and Programming Job#: 1200 General Characteristics Responsible for the full systems development life cycle management of projects/programs. Provides direction for technical and business resources. Actively participates in long-range strategy planning and manages policy development to address complex business issues, provides leadership to cross-functional teams. Serves as the primary point of contact from project/program inception to delivery. Defines and develops project management infrastructure, manages a methodology driven quality plan, monitors and controls the quality of the deliverable, as well as manages the project completion process through customer acceptance. Works with business unit managers and forms alliances on projects, operational decisions, scheduling requirements/conflicts and vendor contract clarification.

  • Anti-Money Laundering and Red Flag Identity Theft Prevention Programs The Trust acknowledges that it has had an opportunity to review, consider and comment upon the written procedures provided by USBFS describing various tools used by USBFS which are designed to promote the detection and reporting of potential money laundering activity by monitoring certain aspects of shareholder activity as well as written procedures for verifying a customer’s identity (collectively, the “Procedures”). Further, the Trust has determined that the Procedures, as part of the Trust’s overall anti-money laundering program and the Red Flag Identity Theft Prevention program, are reasonably designed to prevent the Fund from being used for money laundering or the financing of terrorist activities and to achieve compliance with the applicable provisions of the Fair and Accurate Credit Transactions Act of 2003 and the USA Patriot Act of 2001 and the implementing regulations thereunder. Based on this determination, the Trust hereby instructs and directs USBFS to implement the Procedures on the Trust’s behalf, as such may be amended or revised from time to time. It is contemplated that these Procedures will be amended from time to time by the parties as additional regulations are adopted and/or regulatory guidance is provided relating to the Trust’s anti-money laundering and identity theft responsibilities. USBFS agrees to provide to the Trust:

  • Family Educational Rights and Privacy Act The Charter School is subject to all provisions of the Federal Family Educational Rights and Privacy Act, 20 U.S.C. § 1232g. In the event the Charter School closes, it shall transmit all official student records in the manner prescribed by the State Board.

Time is Money Join Law Insider Premium to draft better contracts faster.