Protection of PFPC PFPC shall be indemnified by the Fund and without liability for any action PFPC takes or does not take in reliance upon directions or advice or Oral Instructions or Written Instructions PFPC receives from or on behalf of the Fund or from counsel and which PFPC believes, in good faith, to be consistent with those directions or advice and Oral Instructions or Written Instructions. Nothing in this section shall be construed so as to impose an obligation upon PFPC (i) to seek such directions or advice or Oral Instructions or Written Instructions, or (ii) to act in accordance with such directions or advice or Oral Instructions or Written Instructions.
PROTECTION OF TEACHERS A. Any case of assault upon a teacher by a student or parent shall be promptly reported to the Board or its designated representative. The Board shall promptly render all reasonable assistance to the teacher in connection with handling of the incident by law enforcement and judicial authorities. Time lost by a teacher in connection with such an incident shall not be charged against the teacher. B. The Board recognizes its responsibility to give reasonable support and assistance to teachers with respect to the maintenance of control and discipline in the classroom. Whenever a teacher determines that a particular student requires the attention of special counselors, social workers, law enforcement personnel, physicians, or other professional persons, such determination shall be promptly called to the attention of the administration. C. Reasonable support and assistance to teachers shall also include protection from liability from students and/or parents in cases of student misuse of the district’s electronic resources. The Association shall notify the Board of any intentional written, verbal, or physical act communicated through the district’s electronic resources in order for the Board to take appropriate action. D. The Board, with the advice of the Association Executive Committee, shall promulgate rules and regulations setting forth the procedures to be used in disciplining, suspending, and expelling students for misbehavior and other infractions of school rules and policies. Such rules and regulations shall define and classify such infractions. Such rules and regulations shall be distributed to students, teachers and parents at the beginning of each school year. The Association shall annually be encouraged to review such rules and regulations and propose policy changes for the improvement of the Code of Conduct. E. A teacher will have the right to review the contents of all records of the district pertaining to said teacher, excluding original references, originating after initial employment and to have a representative of the Association accompany him to such review. No material originating after initial employment will be placed in his personnel file unless the teacher has had an opportunity to review the material and has been furnished with a copy thereof. The teacher may submit a written notation regarding any material and the same shall be attached to the file copy of the material in question. If the teacher believes the material to be placed in his file is in error, he may receive adjustment provided cause is shown through the grievance procedure, whereupon the material will be corrected or expunged from the file. If the teacher is asked to sign material placed in his file, such signature shall be expressly understood as indicating his awareness of the material, but in no instance shall said signature be interpreted to mean agreement with the content of the material. Any disagreement shall be noted. All recommendations, written or oral, shall be based solely upon the contents of the teacher's personnel file. Master personnel files for all teachers will be maintained in the office of the Superintendent. Duplicate files may be maintained by supervisory personnel as an administrative convenience. However, it is expressly agreed that such duplicate files shall be maintained in all respects in strict conformity with the provisions of this Section of this Agreement.
PROTECTION OF WORK 12.1 Subcontractor shall effectually secure and protect the work done hereunder and assume full responsibility for the condition thereof until final acceptance by the OWNER and Contractor. Subcontractor further agrees to provide such protection as is necessary to protect the work and the workmen of Contractor, the OWNER, and other subcontractors from its operations. 12.2 Subcontractor shall be liable for any loss or damage to any work in place or to any equipment and materials on the job site caused by Subcontractor or its agents, employees or guests.
Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.
Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.