Endorsements and Procedures Company agrees to place on the backside of each Check processed for collection at the Bank through this Service a restrictively endorsement which reads “Mobile Deposit to Central Bank”, or words to that effect as satisfactory to Bank. Endorsements must be made on the back of the Check within 1&1/2 inches from the top edge, although Bank may accept endorsements outside this space. Any loss Bank incurs from a delay or processing error resulting from an irregular endorsement or other markings by Company will be Company’s responsibility. Bank may reject any Check payable to co-payees, even if Company is one of the payees listed on the face of the Check. Bank will consider, but is not obligated to accept, Check’s listing Company as one of the co-payees, provided a) the image of the Check presented to Bank under the Service contains the legible signature endorsement of all co-payees to the instrument, including Company; and b) contains a restrictive endorsement above the co-payees signatures which reads “Mobile Deposit to account of [Company’s full name]”. If Company is a sole proprietorship, Checks written as payable in the name of the individual owner of Company may be deposited to Company’s Account at Bank through this Service so long Checks are presented in compliance with the Service’s terms and conditions. Company agrees to comply with any and all other procedures and instructions for use of the Mobile Deposit Service as the Bank may establish from time to time, such as within any applicable Users Guide (the “Procedures”). Cut-off Times for Deposits: Deposits made via Mobile Deposit must be made before 7:00 PM Eastern Standard Time on a Business Day in order to be considered deposited same day. Deposits made after 7:00 PM Eastern Standard Time on a Business Day will be considered deposited the next Business Day. Receipt of Items: Bank reserves the right to reject any item transmitted through Mobile Deposit, at Bank’s discretion, without liability to Company. Bank shall not be responsible for items Bank does not receive or for Check images that are dropped during transmission. An image of an item shall be deemed received when Company receives a confirmation from Bank that we have received the image. Receipt of such confirmation does not mean the transmission was error free or complete. Processing and/or transmission errors can occur after Bank acknowledges receipt that may impact transaction completion. Following receipt of such confirmation, the Bank will process the image by preparing a “substitute check” or clearing the item as an image. Availability of Funds: Once deposited, subject to the cut-off time described above, our policy, in most cases, is to make funds from Company’s Check deposits available to Company on the second Business Day after the day Bank receives the Check in compliance with this Service, unless a different or longer time period is required under Company’s Account Rules and Regulations’ Funds Availability Policy or should Bank decide to apply a longer hold period due to Company’s history of repeated overdrafts or grounds that Bank reasonably believes affects the ultimate collectability of the Check. In all cases, Company will receive full availability of the funds memorialized in Checks accepted by Bank under this Service by the seventh Business Day after Bank accepts the Check for deposit. If Company’s Account has been open 30 days or less, however, Company may not receive full availability until the ninth Business Day after the day of deposit. Disposal of Transmitted Items: After Company receive confirmation that Bank has received and accepted an image of a Check under this Service, and once Company receive full credit for the Check as manifested in Company’s Account balance as communicated by Bank, Company must and shall prominently marking the original Check “VOID” and then destroying that same Check by cross-cut shredding or another commercially acceptable means of destruction. Destroying the Check prevents it from being presented for deposit another time. After destruction of the original Check, the image will be the sole evidence of the original instrument. Company agree that Company will never re-present the original check, nor give the original Check to anyone else for any purpose other than its destruction.
Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.
Rules and Procedures The Benefit Society By-Laws will be amended to provide for a 6th Director with three Directors appointed by the Unions and three Directors appointed by the Corporation.