Working with Vulnerable People Sample Clauses

Working with Vulnerable People. (a) You agree to provide the signed Statement of Compliance referred to in Attachment 1, that you have met your working with vulnerable people, including children obligations to the Program within 30 days of signing this Agreement, and you must comply with these obligations for the Term of this Agreement. (b) You agree that if you fail to comply with working with vulnerable people, including children obligations during the Activity Period, we have a right to terminate this Agreement.
Working with Vulnerable People. It is a Tas Government requirement that any activity provided by a club or association etc which provides instruction to children requires instructors to have a Working With Vulnerable People Card. A child is someone who is 17 years or younger. Should your activity fall into this category, a copy of instructors WWVP cards are to be provided to us. For more information on this, please visit ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇.▇▇▇.▇▇/▇▇▇▇▇▇/▇▇▇▇▇▇▇▇▇-▇▇▇- registration/work-with-vulnerable-people/do-i-need-to-register
Working with Vulnerable People a. Tutors must hold a valid “Working With Vulnerable People” card. A copy of the card must be provided to the committee and will be kept on file for the duration of the Tutor’s tenure in the scheme.
Working with Vulnerable People. 19.1 The transfer of the new services to Six Town for the first time under this Agreement will mean that Six Town will be working with vulnerable people in the housing assessment process, homelessness assessments and signposting and support provision. This is in addition to the work that Six Town already does with vulnerable people in connection with its housing management functions and in particular in its tenancy sustainment activities. 19.2 Six Town will provide and, where relevant, continue to provide, a person-centred and holistic approach in its dealings with vulnerable people. In particular Six Town is expected to provide additional support (beyond that expected to be provided to persons who are not considered vulnerable) including but not limited to Mental ▇▇▇▇▇▇▇▇ ▇▇▇ ▇▇▇▇ assessments and a multi- disciplinary approach to tenancy sustainment. 19.3 It is acknowledged that the eviction of vulnerable tenants is to be used as a last resort and only after complying with the procedure contained in the relevant part of the Specification. 19.4 For the purposes of this clause 19 a person shall be regarded as vulnerable if they are someone who is more likely than the ‘average’ person to suffer detriment or harm if they become homeless. People who may be considered to be vulnerable can include (but are not limited to): 19.4.1 Families with children under 18 and pregnant women; 19.4.2 16-17 year olds; 19.4.3 Households experiencing domestic violence and abuse; 19.4.4 People with mental health problems; 19.4.5 Older people; 19.4.6 People with a physical disability; 19.4.7 People with a learning difficulty; 19.4.8 People with alcohol or substance misuse problems; 19.4.9 Asylum seekers or refugees; 19.4.10 Former rough sleepers; 19.4.11 Ex-offenders; and 19.4.12 People with complex needs e.g. mental health and substance misuse problems.

Related to Working with Vulnerable People

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • PROHIBITION ON CONTRACTING WITH ENTITIES USING CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE EQUIPMENT (Effective Aug. 13, 2020 Pursuant to 2 CFR 200.216, Contractor shall not offer equipment, services, or system that use covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system. ‘‘Covered telecommunications equipment or services means 1) telecommunications equipment produced by Huawei Technologies Company or ZTE Corporation (or any subsidiary or affiliate of such entities); 2) for the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes, video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of such entities);

  • Agreements with Employees and Subcontractors Grantee shall have written, binding agreements with its employees and subcontractors that include provisions sufficient to give effect to and enable Grantee’s compliance with Grantee’s obligations under this Article VI, Intellectual Property.

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.