Orientation and Training A transferring employee will be orientated separately to both or their new home in accordance with Article 20 the collective agreement of the designated employer.
Education and Training The foundation of this Program is education and voluntary compliance. It is recognized that alcohol and chemical dependency may make voluntary cessation of use difficult, and one of the Program’s principal aims is to make voluntary steps toward ending substance abuse easily available. The outside contractor shall review and develop on-going educational and training information on the adverse consequences of substance abuse and the responsibility to avoid being under the influence of alcohol or chemicals at work. Certain training required by the DOT Regulations shall be the responsibility of the Substance Abuse Program.
Professional Development and Training The Company shall pay for or reimburse the Executive for any reasonable professional development or training.
Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.
Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.