Access to IAD File Sample Clauses

Access to IAD File. If an Officer appeals a disciplinary action, and provides a written request, the CITY will provide to the Officer and his/her representative a copy of the un-redacted IAD file within 5 business days of receiving the request. The file remains confidential in the hands of the Officer and his/her representative to the extent the release of such information is still protected from public disclosure by Local Government Code Section 143.089(g) or other law. Additionally, all individuals who have access by virtue of this AGREEMENT to IAD files or investigative information, including the information contained within the 143.089(g) files of police officers, shall be bound to the same extent as the Austin Police Department and the CITY of Austin to comply with the confidentiality provisions of this AGREEMENT, Chapter 143 of the Texas Local Government Code, and the Texas Public Information Act. All such individuals shall further be bound to the same extent as the Austin Police Department and the CITY of Austin to respect the rights of individual police officers under the Texas Constitution and the Fourth, Fifth, and Fourteenth Amendments to the U.S. Constitution, including not revealing information contained in a compelled statement protected by the doctrine set forth in Xxxxxxx v. New Jersey, 000 X.X. 000 (1967), and Xxxxxxx x. Xxxxx, 000 X.X. 000 (1967). The Officer and his/her representative shall not be provided information contained within an IAD file that is made confidential by a law other than Chapter 143 of the Texas Local Government Code, such as records concerning juveniles, sexual assault victims, and individuals who have tested positive for HIV.
AutoNDA by SimpleDocs

Related to Access to IAD File

  • Access to File 12.01 An employee shall upon written request, made a reasonable time before the time of viewing, have an opportunity to view their personnel file in the presence of the Director of Human Resources or their designate. The information the employee may review will be:

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to Files 12.01 A copy of any completed evaluation which is to be placed in a nurse's file shall be first reviewed with the nurse. The nurse shall initial such evaluation as having been read and shall have the opportunity to add views to such evaluation prior to it being placed in a file. Each nurse shall have reasonable access to the file for the purposes of reviewing any evaluations or formal disciplinary notations contained therein in the presence of the supervisor. A copy of the evaluation will be provided to the nurse at the nurse's request.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Internet Grantee must have Internet access. Internet access may be either dial-up or high-speed. Grantee must maintain, at a minimum, one business e-mail address that will be the primary receiving point for all e-mail correspondence from Grantor. Grantee may list additional e-mail addresses at any time during the Term of this Agreement. The additional addresses may be for a specific department or division of Grantee or for specific employees of Grantee. Grantee must notify Grantor of any e-mail address changes within five (5) business days from the effective date of the change.

  • Access to Information Such Purchaser acknowledges that it has had the opportunity to review the Transaction Documents (including all exhibits and schedules thereto) and the SEC Reports and has been afforded, (i) the opportunity to ask such questions as it has deemed necessary of, and to receive answers from, representatives of the Company concerning the terms and conditions of the offering of the Securities and the merits and risks of investing in the Securities; (ii) access to information about the Company and its financial condition, results of operations, business, properties, management and prospects sufficient to enable it to evaluate its investment; and (iii) the opportunity to obtain such additional information that the Company possesses or can acquire without unreasonable effort or expense that is necessary to make an informed investment decision with respect to the investment. Such Purchaser acknowledges and agrees that neither the Placement Agent nor any Affiliate of the Placement Agent has provided such Purchaser with any information or advice with respect to the Securities nor is such information or advice necessary or desired. Neither the Placement Agent nor any Affiliate has made or makes any representation as to the Company or the quality of the Securities and the Placement Agent and any Affiliate may have acquired non-public information with respect to the Company which such Purchaser agrees need not be provided to it. In connection with the issuance of the Securities to such Purchaser, neither the Placement Agent nor any of its Affiliates has acted as a financial advisor or fiduciary to such Purchaser.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

Time is Money Join Law Insider Premium to draft better contracts faster.