Protections for Victims of Abuse Sample Clauses

Protections for Victims of Abuse. (1) An incident or incidents of actual or threatened domestic violence, dating violence, or stalking will not be construed as serious or repeated violations of the lease or other “good cause” for termination of the assistance, tenancy, or occupancy rights of such a victim.
AutoNDA by SimpleDocs
Protections for Victims of Abuse. Notwithstanding any of the provisions in paragraph 18 above:

Related to Protections for Victims of Abuse

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Data Protection Xxx 0000 19.1 For the purposes of the Data Protection Xxx 0000 (the “Act”) the Executive gives his consent to the holding, processing and disclosure of personal data (including sensitive data within the meaning of the Act) provided by the Executive to the Company for all purposes relating to the performance of this agreement including, but not limited to:

  • Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.

  • Sanctions for Violations 6.1 Any breach of the aforesaid provisions by the BIDDER or anyone employed by it or acting on its behalf (whether with or without the knowledge of the BIDDER) shall entitle the BUYER to take all or any one of the following actions, wherever required:-

  • DATA PROTECTION AND FREEDOM OF INFORMATION 7.1. Each party will:-

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Protection of Human Subjects The Recipient agrees to comply with the requirements of the National Research Act, as amended, 42 U.S.C. §§ 289 et seq., and U.S. DOT regulations, “Protection of Human Subjects,” 49 C.F.R. Part 11, pertaining to protections for human subjects participating in or involved in research, development, and activities related to the Project.

  • Plagiarism The appropriation of another person's ideas, processes, results, or words without giving appropriate credit.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD:

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

Time is Money Join Law Insider Premium to draft better contracts faster.