Use of the Secondary Recall List Sample Clauses

The 'Use of the Secondary Recall List' clause defines the conditions under which a secondary list of individuals or entities may be utilized for recall purposes. Typically, this clause outlines when and how the secondary list is activated, such as if the primary recall list is exhausted or unavailable, and may specify the criteria for inclusion on the secondary list. Its core practical function is to ensure continuity and efficiency in recall processes by providing a backup pool of resources, thereby minimizing operational disruptions when the primary recall list cannot meet demand.
Use of the Secondary Recall List. (a) After the exhaustion of the Agency Layoff List for a specific classification within a geographic area, the Secondary Recall List shall be used to fill all positions within a specific classification and geographic area consistent with Section (c) above, until such secondary list is exhausted. (b) To be eligible for appointment from the Secondary Recall List, a laid off employee on such list must meet the minimum qualifications for the classification and any special qualifications for the position. (c) Agencies shall utilize the Secondary Recall List to fill positions by calling for certifications from the list of the five (5) most senior employees who meet the minimum qualifications for the classification and any special qualifications for the position to be filled by selecting one of the five (5) so certified. Seniority for this purpose shall be computed as described per the layoff article of each Agency’s contract. (d) Where fewer than five (5) eligible employees remain on the Secondary Recall List, the Agency shall select one (1) of these employees who meets the minimum qualifications for the class and any special qualifications for the position.
Use of the Secondary Recall List. (A) Notwithstanding any other provision regarding the use of the Secondary Recall List, designated individuals on the secondary list may be given first preference for appointments to positions in order to ensure adequate numbers of protected class employees, based on the goals of the Affirmative Action Plan developed by the Agency effecting the recall, consistent with applicable law. (B) After the exhaustion of any Agency Layoff List for a specific classification within a geographic area, the Secondary Recall List shall be used to fill all positions within a specific classification and geographic area consistent with Section (c) above, until such secondary list is exhausted. (C) To be eligible for appointment from the Secondary Recall List, a laid off employee on such list must meet the minimum qualifications for the classification and any special qualifications for the position. (D) Prior to initiating other methods to fill a vacancy, except an agency layoff list, agencies shall utilize the Secondary Recall List to fill positions. The Agency will call for certifications from the list of the five (5) most senior employees who meet the minimum qualifications for the classification and any special qualifications for the position to be filled. The Agency will select one of the five (5) employees from the list. Seniority for this purpose shall be computed as described in Section 4 of this Article. (E) Where fewer than five (5) eligible employees remain on the Secondary Recall List, the Agency shall select one (1) of these employees who meets the minimum qualifications for the class and any special qualifications for the position.
Use of the Secondary Recall List a. After the exhaustion of the Agency Layoff List for a specific classification within a geographic area, the Secondary Recall List shall be used to fill all positions within a specific classification and geographic area consistent with Section b. To be eligible for appointment from the Secondary Recall List, a laid off employee on such list must meet the minimum qualifications for the classification and any special qualifications for the position. c. Agencies shall utilize the Secondary Recall List to fill positions by calling for certifications from the list of the five
Use of the Secondary Recall List. 29 A. After the exhaustion of the Agency Layoff List for a specific 30 classification within a geographic area, the Secondary Layoff List shall 31 be used to fill all positions within a specific classification and 32 geographic area consistent with Section (c) above, until such secondary 33 list is exhausted 34 B. To be eligible for appointment from the Secondary Recall List, a laid - 35 off employee on such list must meet the minimum qualifications for the 36 classification and any special qualifications for the position. 37 C. Agencies shall utilize the Secondary Recall List to fill positions by 38 calling for certifications from the list of the five (5) most senior 39 employees who meet the minimum qualifications for the classification 40 and any special qualifications for the position to be filled by selecting 41 one (1) of the five (5) so certified. Seniority for this purpose shall be 42 computed as described per the layoff article of each Agency’s contract. 43 D. Where fewer than five (5) eligible employees remain on the Secondary 44 Recall List, the Agency shall select one (1) of these employees who 45 meets the minimum qualifications for the class and any special 46 qualifications for the position.

Related to Use of the Secondary Recall List

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.