Shift Premium for Security and Fire Technicians Sample Clauses

Shift Premium for Security and Fire Technicians. Due to customer requirements, Technicians who are temporarily required to work a shift other than their normal shift will be paid $3.05 in addition to their hourly rate to each hour worked outside of the employee's normal shift All alternate shift work will be on a voluntary basis. If there are not volunteers then a qualified employee, from the seniority pool, will be required to work. The order in which it will be assigned in such instance shall be in reverse order of seniority, based on qualifications. This method shall continue throughout the entire seniority list until all employees have worked an alternate shift. Technicians working an alternate shift are not eligible for overtime unless they work in excess of the scheduled shift or a minimum of 48 hours' notice is not provided. If Technicians complete an alternate shift they will be required to observe an 8 hours rest period before commencing their next shift. In any case there shall be no loss of wages if the Technician does not work the full scheduled shift due to observing the required 8 hours rest period. At the end of the rest period, technicians are required to make themselves available for work by calling into the Supervisor and/or Coordinator.
AutoNDA by SimpleDocs

Related to Shift Premium for Security and Fire Technicians

  • Data Security and Unauthorized Data Release The Requester and Approved Users, including the Requester’s IT Director, acknowledge NIH’s expectation that they have reviewed and agree to manage the requested controlled-access dataset(s) and any Data Derivatives of controlled-access datasets according to NIH’s expectations set forth in the current NIH Security Best Practices for Controlled-Access Data Subject to the GDS Policy and the Requester’s IT security requirements and policies. The Requester, including the Requester’s IT Director, agree that the Requester’s IT security requirements and policies are sufficient to protect the confidentiality and integrity of the NIH controlled-access data entrusted to the Requester. If approved by NIH to use cloud computing for the proposed research project, as outlined in the Research and Cloud Computing Use Statements of the Data Access Request, the Requester acknowledges that the IT Director has reviewed and understands the cloud computing guidelines in the NIH Security Best Practices for Controlled-Access Data Subject to the NIH GDS Policy. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification, the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. All notifications and written reports of data security incidents and policy compliance violations should be sent to the DAC(s) indicated in the Addendum to this Agreement. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Freedom to Use Ideas Subject to Section 9 and Client’s rights in Client Information and notwithstanding anything to the contrary contained in this Agreement or an Order Form, the ideas, methods, concepts, know-how, structures, techniques, inventions, developments, processes, discoveries, improvements and other information and materials developed in and during the course of any Order Form may be used by Red Hat, without an obligation to account, in any way Red Hat deems appropriate, including by or for itself or its clients or customers.

  • Notification of Modifications of Licensed Materials From time to time Publisher may add, change, or modify portions of the Licensed Materials, or migrate the Licensed Materials to other formats. When such changes, modifications, or migrations occur, the Licensor shall give notice of any such changes to Licensee as soon as is practicable, but in no event less than sixty (60) days in advance of modification. Such a notice may also be given directly by the Publisher to the Licensee. If any of the changes, modifications, or migrations renders the Licensed Materials substantially less useful to the Licensee, the Participating Institutions or their Authorized Users, the Licensee may seek to terminate this Agreement for breach pursuant to the termination provisions of this Agreement in Section XI, below.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

  • Procurement of Goods and Works 3. Except as ADB may otherwise agree, Goods and Works shall only be procured on the basis of the methods of procurement set forth below:

  • Appropriate Technical and Organizational Measures SAP has implemented and will apply the technical and organizational measures set forth in Appendix 2. Customer has reviewed such measures and agrees that as to the Cloud Service selected by Customer in the Order Form the measures are appropriate taking into account the state of the art, the costs of implementation, nature, scope, context and purposes of the processing of Personal Data.

  • Procurement of Goods and Services (a) If the HSP is subject to the procurement provisions of the BPSAA, the HSP will abide by all directives and guidelines issued by the Management Board of Cabinet that are applicable to the HSP pursuant to the BPSAA.

  • How to Obtain Warranty Service The Warranty Holder must inspect the Flooring for Manufacturing Defects caused by improper milling, grading, staining and coating, and report any such defects to Cali Bamboo, prior to installation of the Flooring. To obtain warranty service, the Warranty Holder must contact Cali Bamboo’s Customer Experience Department: xxxxxxxxxxxxxxx@xxxxxxxxxx.xxx/ 000-000-0000. Warranty claims must be received within 30 calendar days after the Warranty Holder identifies the Manufacturing Defect or other basis for a warranty claim. To be covered under this Cali Bamboo limited warranty, the Warranty Holder must provide documentation of sales order and proof that the Flooring was properly installed in accordance with the Installation Guide (defined below). Cali Bamboo reserves the right to retain a certified and independent flooring inspector to verify the Warranty Holder’s warranty claims. The determination of the flooring inspector regarding the warranty claim is not binding on either Cali Bamboo or on the Warranty Holder. A determination that does not verify the warranty claim shall not affect the Warranty Holder’s right to submit its claim to arbitration in accordance with the terms of the Arbitration Agreement (as defined in Cali Bamboo’s Terms and Conditions of Purchase). The performance of the inspection, however, if requested by Xxxx Xxxxxx and assuming that Xxxx Xxxxxx advances the full cost of the inspection as described above, is a requirement for the Warranty Holder to submit a warranty claim to arbitration under the Arbitration Agreement. For specific instructions on how to obtain warranty service for defective Flooring, visit the Cali Bamboo website xxxxx://xxx.xxxxxxxxxx.xxx/geowood-flooring-warranty/. Warranty Exclusions and Limitations: This limited warranty covers Flooring that is both (i) installed with strict adherence to Cali Bamboo’s GeoWood flooring installation guide found online at xxxxx://xxx.xxxxxxxxxx.xxx/flooring-installation/ (the “Installation Guide”) and (ii) maintained in accordance with Cali Bamboo’s GeoWood flooring care and maintenance guidelines found online at xxxxx://xxx.xxxxxxxxxx.xxx/floor-care-and-maintenance/ (the “Maintenance Guide”). Cali Bamboo will provide copies of these guides upon request by the Warranty Holder. This limited warranty only applies when the Flooring is used under normal traffic and other usage conditions. The limited warranty for Manufacturing Defects does not apply after the Warranty Holder has installed the Flooring, and product variation or error that does not exceed the 5% industry standard is not considered a Manufacturing Defect for purposes of this limited warranty. This limited warranty does not extend to or cover:

Time is Money Join Law Insider Premium to draft better contracts faster.