Procedures and Safeguards Sample Clauses

The "Procedures and Safeguards" clause outlines the specific steps and protective measures that parties must follow to ensure compliance and minimize risks within an agreement. Typically, this clause details the processes for handling sensitive information, responding to incidents, or conducting certain activities, and may require regular audits, reporting, or adherence to industry standards. Its core function is to establish clear protocols that protect the interests of all parties and reduce the likelihood of errors, breaches, or disputes.
Procedures and Safeguards. 7.7.1 The Agency may conduct investigations to discover the facts and circumstances surrounding any complaint, allegation, or suspicion of wrongdoing by a bargaining unit employee. However, the Agency will take precautions to protect the rights and privacy of personnel being investigated. 7.7.2 Investigations conducted by the Agency will not commit any act which would deprive the bargaining unit employee of any statutory or constitutional rights or privileges. 7.7.3 The Employer will provide the employee with copies of all personnel orders pertaining to bargaining unit employees as soon as the personnel orders are issued. As used in this section "personnel orders" shall be defined as all written notices of actual disciplinary actions (notices of intent to take disciplinary actions), transfer notices, promotion notices and termination notices. 7.7.4 A bargaining unit employee shall be required to answer only those questions specifically relating to such employee’s duties and responsibilities within the scope of his/her employment, and acts or conduct (on or off the job) which adversely affects the employee's performance and/or the employing agency's performance or function. 7.7.5 The employee shall be entitled to such reasonable intermissions as he/she shall request for personal necessities. 7.7.6 The interview of the employee shall be during regular business hours. With the exception of telephone interviews, interviews shall take place at Employer facilities, or elsewhere if mutually agreed unless an emergency exists which requires the interview to be conducted elsewhere. No employee shall be scheduled for interviews on his/her day off; however, any employee who is interviewed off duty will be compensated. 7.7.7 The employee under investigation must, at the time of an interview, be informed of the name of the individual in charge of the investigation and the name of the individual who will be conducting the interview. At the State Fire Marshal’s Office, the investigating officer and the individual who will be conducting the interviews shall be one of the District Chief Deputies, the Chief Investigator, or the Fuels Division Manager. An investigating officer may do both duties. At any time an investigation of a complaint, allegation or suspicion of wrongdoing by a bargaining unit employee is determined to involve a violation of a criminal law, the investigation shall be turned over to the Nebraska State Patrol.
Procedures and Safeguards. The Services include the procedures and safeguards that will be developed by Vendor, with the PBC’s approval, within thirty (30) days from the Effective Date to prevent and mitigate the risk of any losses, damages, expenses and costs arising from the destruction, loss or alteration of City Data in connection with the Services (the “Data Protection Plan”).
Procedures and Safeguards. Manager will establish and maintain environmental, safety and facility procedures, data security procedures and other safeguards against the destruction, corruption, loss or alteration of Owner Data and to prevent access, intrusion, alteration or other interference by any unauthorized third parties of the same, that are: (a) no less rigorous than those maintained by Manager for its own information or the information of its Owners of a similar nature; and (b) no less rigorous than the accepted practices in the industry. Without limiting the generality of the foregoing, Manager will: (x) house all equipment in physically secure premises protected at least by access controlled doors; and (y) utilize state-of-the-art virus and intrusion checking software and firewalls.

Related to Procedures and Safeguards

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Procurement Procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.