POL029 UAB Policy on Identification and Communication of Human Subjects PRO124 Procedure for Identification and Communication of Human Subjects Research to Non-UAB-Affiliated Performance Sites PRO152 ...
The purpose of this policy and procedures is to outline the general process of the Human Resources Labor and Employee Relations Unit (“Labor and Employee Relations”) when conducting investigations.
Challenging economic times require hard work and patience. Well-planned employee incentive programs ideally result in stronger teams and harder-working staff. Employees who feel they are valuable ...
Capitalized terms used herein have the same definition as the Privacy Policy, C7.0. Additionally, the following definitions shall apply to these Procedures ...
There may be times when an employee disagrees with a decision made by his/her manager (or supervisor) in the application or interpretation of Brandeis University or department policy, which results in ...
The Graduate School Grievance Process and Procedure (“the Grievance P&P” or “P&P”) establishes and describes the process through which graduate students can communicate concerns related to academic ...
All University Policies must be developed, approved, and distributed in compliance with the standards and format set forth in this Policy. When Policies conform to the approved format, they promote ...
Sac State uses a 3rd party vendor called Tracker I-9 Complete to create and track I-9 forms electronically. New employees or returning employees who have been separated from the campus for a year or ...
Media, both electronic and paper format, contains Institutional Data, and must be protected from unauthorized access. This policy is to establish standard risk protocol for the cleanup of data storage ...
Collecting a company's accounts receivable is a routine task until an account stops paying. Companies write off small balances when the time and money spent to collect the amount due exceeds the ...
The purpose of this document is to provide a step-by-step solution for Michigan Tech’s media destruction process. IT will provide the appropriate actions required to properly dispose of magnetic data ...
The majority of companies deploying cloud computing solutions have no cloud-specific security policies and procedures in place and have no measures to approve or evaluate cloud applications that use ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results