Operational procedures and guidelines Sample Clauses

The 'Operational procedures and guidelines' clause defines the standards and processes that parties must follow to carry out their responsibilities under the agreement. It typically outlines step-by-step instructions, reporting requirements, and protocols for routine operations, such as communication methods, escalation procedures, or quality control measures. By establishing clear and consistent procedures, this clause ensures that all parties understand their operational roles, reduces the risk of misunderstandings, and promotes efficient and compliant execution of the contract.
Operational procedures and guidelines. 3.1. Any member of staff may log faults and requests via the online helpdesk. All requests logged on the online helpdesk are processed according to the response criteria in section 4. 3.2. It is requested that all tasks are logged to the online helpdesk by school staff. Calls not logged on the online helpdesk risk being missed or not prioritised correctly against other known work. 3.3. It is recommended that a school main contact person be nominated to simplify fault management and feedback. The main contact, ideally a technical lead, will agree helpdesk priorities for visiting technicians at the start of the visit. 3.4. The Cable and wireless service for schools will ; 3.4.1. Provide support, information and communications by telephone, Internet, remote support, e-mail or any other appropriate means. 3.4.2. Conduct support and maintenance to equipment and systems on a reasonable endeavours basis with the goal of completing work in the shortest time scale. 3.4.3. Notify the main contact of items that are beyond economic repair due to misuse or age. These may be returned to school or sent for disposal. 3.4.4. Provide loan equipment subject to suitability and availability. 3.4.5. Endeavour to eliminate service disruption where possible. 3.4.6. Require appropriate site access to perform requested duties. 3.4.7. Abide by the Wirral Council Internet and computer usage policy and security guidelines. 3.4.8. Follow Wirral Local Authority and government guidance as applicable. 3.4.9. Obtain required security clearances for staff to work in schools. 3.4.10. Repair equipment at school or off site as necessary, subject to quotation if applicable. 3.4.11. Remove equipment or data from school only with authorisation from school staff. All staff are bound by Data Protection legislation. 3.4.12. Advise on the proper use, accommodation required and environmental conditions for supported equipment. 3.4.13. Identify restoration costs in cases of accident or wilful damage. This is normally to assist with school insurance claims.
Operational procedures and guidelines. 3.1. Any member of staff may log faults and requests via the online helpdesk. 3.2. It is requested that all tasks are logged to the online helpdesk by school staff. 3.3. Calls not logged on the online helpdesk risk being missed or not prioritised correctly against other known work. It is recommended that a school main contact person be nominated to simplify fault management and feedback. The main contact, ideally a technical lead, will agree helpdesk priorities for visiting technicians at the start of the visit. 3.4. Regular site visit support is booked as a standard half day slot (three hours). Regular visits at less than a half day are consumed in units of half an hour but will also include travelling time.
Operational procedures and guidelines. 3.1 This service is to support schools in the use of Management Information Systems (MIS) in the schools preferred provider ie ▇▇▇▇ software and Microsoft Office products. 3.2 Support calls, training requests and ▇▇▇▇ upgrades can be logged via the helpdesk by the following means: phoning 666 4446 faxing 666 3167 or emailing ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇▇▇▇▇.▇▇▇.▇▇. 3.3 The application and a brief description of the call will need to be provided, a reference number will be assigned and the call will be allocated a response as detailed in 3.5. 3.4 The normal hours of support are from 9.00am until 5.00pm, Monday to Friday, excluding public holidays, council closures and team meetings. 3.5 A computerised helpdesk system will be used for call logging and recording solutions, the system will automatically produce response times compared to pre- recorded performance indicators. Response times: 3.6 Support following relevant installations and training will be provided by telephone, remote access and/or on-site as necessary. 3.7 Following new versions of applications, documentation will be revised and update courses will be run if it is a major release. 3.8 Solutions to problems raised in the use of applications listed in point 2 will be provided.
Operational procedures and guidelines. 3.1. Any member of staff may log faults and requests via the online helpdesk. All requests logged on the online helpdesk are processed according to the response criteria in section 4. 3.2. It is requested that all tasks are logged to the online helpdesk by school staff. Calls not logged on the online helpdesk risk being missed or not prioritised correctly against other known work. 3.3. The Vault service for schools will ; 3.3.1. Provide storage for backup purposes. Services are supplied "AS IS". 3.3.2. Provide support, information and communications by telephone, Internet, remote support, e-mail or any other appropriate means. 3.3.3. Abide by the Wirral Council Internet and computer usage policy and security guidelines. 3.3.4. Follow Wirral Local Authority and government guidance as applicable. 3.3.5. Be bound by Data Protection legislation.

Related to Operational procedures and guidelines

  • Operational Procedures In order to minimize operational problems, it will be necessary for a flow of information to be supplied in a secure manner by Subadviser to the Trust’s service providers, including: The Bank of New York Mellon (the “Custodian”), Virtus Fund Services, LLC (the “Fund Administrator”), BNY Mellon Investment Servicing (US) Inc., (the “Accounting Agent”), any Prime Broker to the Series, and all other Counterparties/Brokers as required. The Subadviser must furnish the Trust’s service providers with required daily information as to executed trades in a format and time-frame agreed to by the Subadviser, Custodian, Fund Administrator, Accounting Agent and Prime Broker/Counterparties and designated persons of the Trust. Trade information sent to the Custodian, Fund Administrator, Accounting Agent and Prime Broker/Counterparties must include all necessary data within the required timeframes to allow such parties to perform their obligations to the Designated Series. The Accounting Agent specifically requires a daily trade blotter with a summary of all trades, in addition to trade feeds, including, if no trades are executed, a report to that effect. Daily information as to executed trades for same-day settlement and future trades must be sent to the Accounting Agent no later than 5:00 p.m. (Eastern Time) on the day of the trade each day the Trust is open for business. All other executed trades must be delivered to the Accounting Agent on trade date +1 by 11:00 a.m. (Eastern Time) to ensure that they are part of the Designated Series’ NAV calculation. (Subadviser will be responsible for reimbursement to the Trust for any loss caused by the Subadviser’s failure to comply with the requirements of this Schedule A.) On fiscal quarter ends and calendar quarter ends, all trades must be delivered to the Accounting Agent by 4:30 p.m. (Eastern Time) for inclusion in the financial statements of the Designated Series. The data to be sent to the Accounting Agent and/or Fund Administrator will be as agreed by the Subadviser, Fund Administrator, Accounting Agent and designated persons of the Trust and shall include (without limitation) the following:

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the Company’s Policies and Procedures as they may exist from time to time.