PROTECTION OF VULNERABLE ADULTS Sample Clauses

PROTECTION OF VULNERABLE ADULTS. It is the responsibility of the Hirer to ensure the protection of any vulnerable adults using the Hall. IN THE EVENT OF FIRE Evacuate the premises. Call the Fire Service (999 or 112) stating: “Fire at Xxxxx Xxxx, (St Xxxxx & St Paul's Church Hall), 0-0 Xxxx Xxxxxx, Xxxxxxxxxx, Xxxx, DA4 0DG – behind St Xxxxx & St Paul's Church " The nearest trained person may, if it is safe to do so, attempt to extinguish a fire using the appropriate extinguisher (for instance water or foam extinguishers must never be used on an electrical fire). Those fighting the fire must ensure their means of escape is always available. If the fire cannot be extinguished IMMEDIATELY and if not already done so, the instruction to evacuate (see 4.3 below) must be given. If the fire appears to be getting out of hand no further attempts must be made to extinguish it. If any clothing catches fire while on the person, cover it: Drop and Roll – and xxxxx with water if possible and safe to do so.
PROTECTION OF VULNERABLE ADULTS. It is the responsibility of the Hirer to ensure the protection of any vulnerable adults using the Church. IN THE EVENT OF FIRE Evacuate the premises. Call the Fire Service (999 or 112) stating: “Fire at St Xxxxxx of Tours Church, Station Road, Eynsford, Kent, DA4 0EH " The nearest trained person may, if it is safe to do so, attempt to extinguish a fire using the appropriate extinguisher (for instance water or foam extinguishers must never be used on an electrical fire). Those fighting the fire must ensure their means of escape is always available. If the fire cannot be extinguished IMMEDIATELY and if not already done so, the instruction to evacuate (see 4.3 below) must be given. If the fire appears to be getting out of hand no further attempts must be made to extinguish it. If any clothing catches fire while on the person, cover it: Drop and Roll – and xxxxx with water if possible and safe to do so.
PROTECTION OF VULNERABLE ADULTS. The Edinburgh Adult Protection Committee’s remit is to ensure a co-ordinated approach to the protection of vulnerable adults within the City of Edinburgh. CEC, NHS Lothian, Lothian and Borders Police, Care Commission
PROTECTION OF VULNERABLE ADULTS. It is the responsibility of the Hirer to ensure the protection of any vulnerable adults using the Church.
PROTECTION OF VULNERABLE ADULTS. 11.5You must have a Protection of Vulnerable Adults Policy that reflects the principles and procedures of the Local Authority’s Protection of Vulnerable Adults Policy. Staff must be trained in this area and made fully aware of this policy and the principles of the policy put into practice in all areas of service delivery. If relevant, you must also operate a Child Protection Policy where any of your services have children or young people resident.
PROTECTION OF VULNERABLE ADULTS. The Council’s policy will be applied by staff of both organisations, in close collaboration with each other.
AutoNDA by SimpleDocs
PROTECTION OF VULNERABLE ADULTS. Following the publication in May 2004 of reports published by the Social Services Inspectorate and the Mental Welfare Commission on the inspection and investigation of services for people with learning disabilities in Borders Council, significant work has been undertaken on the protection of vulnerable adults within Angus Council. An audit of cases within physical and learning disability services has been completed, this also includes cases which are held by staff employed by health. In addition a number of cases within older people services and community mental health teams have been audited. An action plan to address issues arising from the audits is being developed. Representatives from Dundee City, Perth and Angus Councils have met with Tayside Police and NHS Tayside to draw up a multi-agency protocol which will operate across Tayside. This is currently in its final draft form. Within Angus staff have been issues with interim operational instructions and comprehensive final instructions will be issued later in the year. A training strategy will be implemented which will include staff from health, police, voluntary sector and service providers as well as operational staff.

Related to PROTECTION OF VULNERABLE ADULTS

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Protection of Proprietary Information The Seller has taken all reasonable steps to maintain the confidentiality of and otherwise protect and enforce their rights in all proprietary information pertaining to the Seller or any Seller Product. Without limiting the generality of the foregoing, no portion of the source code for any software ever owned or developed by the Seller has been disclosed or licensed to any escrow agent or other Person.

  • Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Protection of Proprietary Rights 4.1 Right to Use Licensed Products Licensee acknowledges that no right, title, or interest, other than the right to use the Licensed Products, is transferred or granted by this Agreement. Licensee is prohibited from selling, renting, leasing, making available to third parties, and sublicensing the Licensed Products.

  • Protection of Confidential Information The Servicer shall keep confidential and shall not divulge to any party, without the Seller’s prior written consent, any nonpublic information pertaining to the Mortgage Loans or any borrower thereunder, except to the extent that it is appropriate for the Servicer to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies or it is otherwise in accordance with Accepted Servicing Practices.

  • PROTECTION OF TEACHERS A. The Board recognizes its responsibility to give all reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom.

  • Protection of Improvements So far as practicable, Purchaser shall protect Specified Roads and other improvements (such as roads, trails, telephone lines, ditches, and fences):

Time is Money Join Law Insider Premium to draft better contracts faster.