Summer School Protocol Sample Clauses

Summer School Protocol. Once summer school vacancies without incumbents, as defined in Article 26.06(c), become known, and Article 26.06(d)(1) and (2) have been applied, the vacancies shall be offered as soon as reasonably Back To Index possible to teachers who have completed the Expression of Interest to Teach Summer School Form, in order or priority according to Article 26.06(d)(3) and (4) . Such offers shall stand until 4:00 PM on the Thursday preceding the first day of summer school classes. After 4:00 PM on the Thursday preceding the first day of summer school classes, remaining vacancies shall be offered to teachers who have completed the Expression of Interest to Teach Summer School Form in order of priority according to Article 26.06(d)(3) and (4). If at any step of the priority sequence a teacher cannot be reached, the offer can be made to the next teacher in sequence, and so on, until the vacancy is filled. Summer School Supervisors shall keep a log of all job offers made using the above protocol and this will be made available to the Bargaining Unit upon request.
AutoNDA by SimpleDocs

Related to Summer School Protocol

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

  • Summer School SUCCESS employees are not eligible for this provision. Employees engaged in teaching summer school shall be granted two summer school days of absence in a single term for either sick leave or emergency leave, or a combination of both, non-accumulative.

  • Protocol The attached Protocol shall be an integral part of this Agreement.

  • Signaling protocol The Parties will interconnect their networks using SS7 signaling where Technically Feasible and available as defined in GR 905 Telcordia Standards including ISDN User Part (ISUP) for trunk signaling and TCAP for CCS-based features in the Interconnection of their networks. All Network Operations Forum (NOF) adopted standards shall be adhered to. Where available, CenturyLink signaling services to link its Signaling Transfer Points (STPs) for CLEC switches which connect to CenturyLink’s STPs via “A” links or for CLEC’s STPs to connect to CenturyLink’s STPs via “D” links which are dedicated to the transport of signaling for local Interconnection, may be ordered from the CenturyLink Tariff.

  • Statewide HUB Program Statewide Procurement Division Note: In order for State agencies and institutions of higher education (universities) to be credited for utilizing this business as a HUB, they must award payment under the Certificate/VID Number identified above. Agencies, universities and prime contractors are encouraged to verify the company’s HUB certification prior to issuing a notice of award by accessing the Internet (xxxxx://xxxxx.xxx.xxxxx.xx.xx/tpasscmblsearch/index.jsp) or by contacting the HUB Program at 000-000-0000 or toll-free in Texas at 0-000-000-0000.

  • Research Use Reporting To assure adherence to NIH GDS Policy, the PI agrees to provide annual Progress Updates as part of the annual Project Renewal or Project Close-out processes, prior to the expiration of the one (1) year data access period. The PI who is seeking Renewal or Close-out of a project agree to complete the appropriate online forms and provide specific information such as how the data have been used, including publications or presentations that resulted from the use of the requested dataset(s), a summary of any plans for future research use (if the PI is seeking renewal), any violations of the terms of access described within this Agreement and the implemented remediation, and information on any downstream intellectual property generated from the data. The PI also may include general comments regarding suggestions for improving the data access process in general. Information provided in the progress updates helps NIH evaluate program activities and may be considered by the NIH GDS governance committees as part of NIH’s effort to provide ongoing stewardship of data sharing activities subject to the NIH GDS Policy.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Research Analyst Independence The Company acknowledges that the Underwriters’ research analysts and research departments are required to be independent from their respective investment banking divisions and are subject to certain regulations and internal policies, and that such Underwriters’ research analysts may hold views and make statements or investment recommendations and/or publish research reports with respect to the Company and/or the offering that differ from the views of their respective investment banking divisions. The Company hereby waives and releases, to the fullest extent permitted by law, any claims that the Company may have against the Underwriters with respect to any conflict of interest that may arise from the fact that the views expressed by their independent research analysts and research departments may be different from or inconsistent with the views or advice communicated to the Company by such Underwriters’ investment banking divisions. The Company acknowledges that each of the Underwriters is a full service securities firm and as such from time to time, subject to applicable securities laws, may effect transactions for its own account or the account of its customers and hold long or short positions in debt or equity securities of the companies that may be the subject of the transactions contemplated by this Agreement.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

Time is Money Join Law Insider Premium to draft better contracts faster.