Safety Rules 5.01 The safety rules of the State having jurisdiction shall be observed by the parties hereto. It is recognized that the Employer has the exclusive responsibility for providing a safe and healthful workplace. To assist the Employer in maintaining an effective and continuing safety program, a permanent Joint Safety Committee shall be established, consisting of two (2) members from the Union and two (2) members from the Employers, who shall meet at regular times to administer educational instructions, investigate serious accidents, and to draft appropriate safety rules. Such rules as adopted by this committee, shall become a part of this Agreement.
Common Areas - Rules and Regulations Lessor or such other person(s) as Lessor may appoint shall have the exclusive control and management of the Common Areas and shall have the right, from time to time, to establish, modify, amend and enforce reasonable Rules and Regulations with respect thereto in accordance with Paragraph 40. Lessee agrees to abide by and conform to all such Rules and Regulations, and to cause its employees, suppliers, shippers, customers, contractors and invitees to so abide and conform. Lessor shall not be responsible to Lessee for the non-compliance with said rules and regulations by other lessees of the Industrial Center.
Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.
Access Requirements You will be responsible for providing the System to enable you to use an Electronic Service.
Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.