Second Meeting – The Fire Fighter’s Response Sample Clauses

Second Meeting – The Fire Fighter’s Response. After a period of time during which the fire fighter may review the allegations against him/her and the evidence in support of the allegations, the fire fighter will have an opportunity to present his/her side of the case to the Department Head. The fire fighter may present mitigating evidence, in any form, that he/she believes to be relevant and/or helpful to Department Head in coming to a fair and consistent disciplinary decision. The evidence presented by the fire fighter, to the extent it has not already been publicly released or is considered ‘super-public’ pursuant to Chapter 552 of the Texas Government Code, is not public information, not subject to an open records request and is confidential by law pursuant to section 143.089 of the Texas Local Government Code. The fire fighter’s counsel may be present at this meeting. The Internal Affairs investigator, the fire fighter’s supervisor and the Department’s legal advisor will also be present. The meeting will be recorded. After the fire fighter has completed his/her presentation, the Department Head will establish a date and time at least 3 to 5 business days later for the final meeting.
AutoNDA by SimpleDocs

Related to Second Meeting – The Fire Fighter’s Response

  • Reactive Power and Primary Frequency Response 9.6.1 Power Factor Design Criteria

  • Red Hat Directory Server Use Cases Subscription Services are provided for Red Hat Directory Server only when used for its supported Use Case in accordance with the terms of this Exhibit and Table 3.1 below.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

  • REQUIRED PRICE PROPOSAL RESPONSE All pricing must be fixed cost, inclusive of all expenses and fees if this Statement of Work proposal is for a fixed price agreement. (Remove if Time and Materials agreement) For Time and Materials the pricing proposal must include estimated effort hours, hourly rate for proposed personnel, projected timeline, including timing expectations for the State functional and technical resources and be submitted as a separate document from the rest of the proposal. (Remove if not Time and Materials)

  • Provisioning of High Frequency Spectrum and Splitter Space 3.2.1 BellSouth will provide <<customer_name>> with access to the High Frequency Spectrum as follows:

  • Directory Listing and Directory Distribution 41 5. Voice Information Service Traffic 43 6. Intercept and Referral Announcements 44 7. Originating Line Number Screening (OLNS) 44 8. Operations Support Systems (OSS) Services 44 9. Poles, Ducts, Conduits and Xxxxxx-xx-Xxx 00 00. Telephone Numbers 51 11. Routing for Operator Services and Directory Assistance Traffic 51 12. Unauthorized Carrier Change Charges 52 13. Good Faith Performance 52 INTERCONNECTION ATTACHMENT. 53 1. General 53 2. Points of Interconnection and Trunk Types 53 3. Alternative Interconnection Arrangements 57 4. Initiating Interconnection 58 5. Transmission and Routing of Telephone Exchange Service Traffic 59

  • OUR RESPONSIBILITY FOR LOSS OR DAMAGE SUFFERED BY YOU 14.1 We are responsible to you for foreseeable loss and damage caused by us. If we fail to comply with this Agreement, we are responsible for loss or damage you suffer that is a foreseeable result of our breaking this Agreement or our failure to use reasonable care and skill, but we are not responsible for any loss or damage that is not foreseeable. Loss or damage is foreseeable if either it is obvious that it will happen, or if, at the time the Agreement is made, both we and you knew it might happen. We are not responsible for any loss or damage you suffer which is a result of you breaking this Agreement or you acting fraudulently.

  • Project Managers; Meetings 10.1 Promptly following the Effective Date, each Party shall designate a Project Manager responsible for coordinating the Party’s Work and shall provide the other Party with a written notice containing the name and contact information of such Project Manager (“Project Manager”). In no event shall any Project Manager be authorized to amend or modify the provisions of this Agreement. Each Party may change its Project Manager, from time to time, by written notice to the other Party.

  • COMMERCIAL REUSE OF SERVICES The member or user herein agrees not to replicate, duplicate, copy, trade, sell, resell nor exploit for any commercial reason any part, use of, or access to 's sites.

Time is Money Join Law Insider Premium to draft better contracts faster.