Vulnerable Adult Sample Clauses

Vulnerable Adult. The employee may be discharged upon discovery of violation of the Minnesota Vulnerable Adult Act and its amendments. This includes unlawful neglect or abuse of an adult handicapped client.
AutoNDA by SimpleDocs
Vulnerable Adult. A vulnerable adult is one who habitually lacks the use of reason (Canon 99) or who, because of mental or physical disability is incapable of protecting himself/herself from sexual abuse.
Vulnerable Adult. (1) Individuals age eighteen (18) years or older, who require assistance with activities of daily living and who may be put at risk of abuse during service provision; (2) Individuals age eighteen
Vulnerable Adult. (1) Individuals age eighteen (18) years or older, who require assistance with activities of daily living and who may be put at risk of abuse during service provision; (2) Individuals age eighteen (18) years or older who have a permanent or temporary limited physical and/or mental capacity that may put them at risk of abuse during service provision because it renders them: unable to make decisions for themselves, unable to physically defend themselves, or unaware of physical abuse or other harm that could be perpetrated against them. Activities of daily living are defined as the basic tasks of everyday life, such as eating, bathing, dressing, toileting, and transferring.
Vulnerable Adult. The words “vulnerable adult” mean any person 18-years old or older of all genders without the developmental or cognitive capacity to give consent or to protect himself/herself/themselves against significant harm or exploitation.
Vulnerable Adult. Any person 18 years or older whose ability to protect him- or herself is compromised due to health status, mental or physical challenges, or admission as an inpatient. BACKGROUND AND CHARACTER CHECK POLICY Authority to Approve Board of Directors Approval Date March 25, 2015 Effective Date 90 days after approval Supersedes HR-106 Due for Review 2017 Responsible for Review ANTHC Legal and ANTHC Human Resources Related Policies, Procedures, Etc. Purchasing and Procurement Policy # 01-2007 References and Historical Notes Indian Child Protection and Family Violence Prevention Act, 25 USC 3207; 42 CFR Part 136, subpart K

Related to Vulnerable Adult

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Critical Illness Three (3) days per year, with pay, shall be granted in the case of a critical illness or accident to a member of the employee's immediate family as defined in Section 9.4.2. A statement by the physician verifying the need for the employee to be present with the immediate family member shall be attached to the absence form.

  • Reporting of Non-Force Majeure Events Each Party (the “Notifying Party”) shall notify the other Parties when the Notifying Party becomes aware of its inability to comply with the provisions of this Agreement for a reason other than a Force Majeure event. The Parties agree to cooperate with each other and provide necessary information regarding such inability to comply, including the date, duration, reason for the inability to comply, and corrective actions taken or planned to be taken with respect to such inability to comply. Notwithstanding the foregoing, notification, cooperation or information provided under this Article shall not entitle the Party receiving such notification to allege a cause for anticipatory breach of this Agreement.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Teaching Staff Assigned to More Than One Building Each Educator who is assigned to more than one building will be evaluated by the appropriate administrator where the individual is assigned most of the time. The principal of each building in which the Educator serves must review and sign the evaluation, and may add written comments. In cases where there is no predominate assignment, the superintendent will determine who the primary evaluator will be.

  • Provider Network The Panel of health service Providers with which the Contractor contracts for the provision of covered services to Members and Out-of-network Providers administering services to Members.

Time is Money Join Law Insider Premium to draft better contracts faster.