Sentences with phrase «for breach of policy»

The main issue is whether the employer terminated Mr. Stewart because of his addiction (raising aprima facie case of discrimination), or whether the employer terminated him for breach of the Policy prohibiting drug use unrelated to his addiction because he had the capacity to comply with those terms (not raising a prima facie case of discrimination).
After a thorough review of all the evidence, the Tribunal concluded that the employer had terminated Mr. Stewart's employment for breach of its Policy.
As such we would recommend policies on use of social networking sites including details of what constitutes damaging, or illegal communications such as posting confidential information on the scheme; how the scheme will monitor compliance with the policy; and the sanctions imposed for any breach of the policy.
Did an employer terminate employment because of addiction to cocaine (raising a prima facie case of discrimination), or for breach of the Policy prohibiting drug use unrelated to his addiction because he had the capacity to comply with those terms (not raising a prima facie case of discrimination).
The Tribunal concluded the employer terminated for breach of its Policy, and the Tribunal's conclusion was reasonable.

Not exact matches

Theoretically, breaching someone's privacy — even that of a quasi-government official — should be something that we do when there is a compelling argument for it, some broader social policy aspect, as there arguably is with the tape recordings of Donald Trump admitting to horrible behavior towards women.
Companies need to back up policies and technology with contracts that spell out the penalties a business partner would incur for breaching any part of the agreement.
The cyber policy should be comprehensive, setting forth the types, access, usage, and classification of data as well as include procedures for remote access, the usage of social media, and the protocols in the event of an incident or data breach.
Even before the data breach came to a head, Facebook has begun to remedy the issues by making changes to its privacy policies, implementing stricter standards for third - party applications, and doubling the headcount of employees who work to protect user security.
In response to a parliamentary question tabled in the House of Lords, the Department for Education (DfE) has at last conceded that the overwhelming majority of objections submitted to school admission policies by the British Humanist Association (BHA) and Fair Admissions Campaign (FAC) correctly identified breaches of the law.
«His errors in the handling of the Murdoch bid, his misleading of parliament and his clear breaches of the Ministerial Code are undermining his department and delaying important policy - making for the media and creative industry,» she commented.
Action taken for breach of uniform policy can differ.
It's much more common for breaches to happen as a result of human error or a failure to follow information handling policies.
Ms Baldwin also pointed to a «lack of policies and procedures» to «ensure public funds are protected and to secure best value for those funds», and said there had been «a significant number» of breaches of the academies financial handbook relating to a «lack of recruitment, independence checks, risk management and internal controls».
The report said a lack of both policies and procedures for the Trust and the school, «made it difficult to assess whether policies and processes have been breached».
The lawsuit alleges that the insurers breached two «all risk» New York property insurance policies, and an Agreement for Interim Payment under which the insurers made a non-refundable interim payment of $ 28 million to Lazare Kaplan in January of this year.
One of the more common reasons for a reservation of rights letter is that the policyholder breached a condition of the policy.
Please refer to ASIC's privacy policy for information about how ASIC handles personal information, your rights to seek access to and correct personal information and how to complain about breaches of your privacy by ASIC.
Life Insurance By Jeff is not liable or responsible for these third - party company's privacy policies or procedures, or any loss or breach of data through these third - party systems.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
You will indemnify, defend, and hold the Rescue harmless from and against any claims, lawsuits, injuries, damages, losses, costs, or expenses whatsoever sustained by any companion animal or any person in connection with your intentional misconduct or grossly negligent performance of Foster Care for the Rescue or your breach of the Rescue's rules, regulations, policies, and programs.
I will indemnify, defend and hold the FHS harmless from and against any claims, lawsuits, injuries, damages, losses, costs or expenses whatsoever, sustained by misconduct or grossly negligent performance of volunteer activities for the FHS, or my breach of the FHS's rules and policies.
It is your responsibility to review such linked sites» privacy policies and TravelGround.com shall not be liable for the breach of any such privacy policies by the owners of such linked sites.
Event Planners must be authorised by the Event Owner to earn GC Award Points for organising a Qualifying Event and shall release and indemnify The Company against any liability or claim arising from any failure to declare any benefits received under the Event Planner Rewards or for breach of any applicable law or regulation, gift and incentive policy, guideline or compliance requirement.
One board member, Sharon Squassoni, of George Washington University's Institute for International Science and Technology Policy, said Russia was also responsible for raising tensions, for example by deploying ground - launched cruise missiles in 2017 in breach of the 1987 Intermediate - range Nuclear Forces (INF) treaty.
The second reason for his termination involved breaches of University policies in relation to travel and use of University resources.
Within 24 hours, he also received a letter outlining a list of trivial instances in which he was accused of breaching CSIRO policy, for example not completing a leave form properly.
The second of the review's terms of reference should extend beyond reviewing the CRU's policies and practices to whether these have been breached by individuals, particularly in respect of other kinds of departure from objective scientific practice, for example, manipulation of the publication and peer review system or allowing pre-formed conclusions to override scientific objectivity.
If asking for an explanation of such, if saying that this appears to a breach of NSF policies, make me a denialist in your eyes, then so be it.
Is it everyone who points out the reality that economically irrational policies will not be accepted or implemented nor survive if they are implemented (as demonstrated by 20 years of failed UN climate conferences attempting to implement targets and timetables for emissions reduction with penalties for breaches of commitments)?
A highly significant proposal is the removal of the provision by which insurers are prevented from denying cover for policy breaches and non-disclosure.
Beyond urging companies to create policies to better manage cybersecurity risks and disclose breaches, the guidance also called for rules to prevent company insiders from trading stock before the public is informed of a cyber incident.
By: Whitten and Lublin Category: Breach of Policy, Cause for Dismissal, Employment Contracts, Employment Law Advice, In the Media, Resignation, Wrongful Dismissal No Comments
By: Whitten and Lublin Category: Breach of Policy, Cause for Dismissal, Discrimination in the Workplace, Harassment in the Workplace, Human Rights, In the Media, Wrongful Dismissal No Comments
However, the Tribunal concluded that Stewart was terminated not because of his addiction, but rather for breaching the Policy, which required him to disclose his addiction or dependency before the occurrence of an incident.
Supreme Court of Canada Decision: No Prima Facie Discrimination The Supreme Court dismissed the appeal, with the majority confirming that the employer terminated Stewart for breaching the Policy's requirement to disclose his drug use, and that discrimination based on his disability was not a factor in the termination of his employment.
Following an investigation during which Stewart stated he believed he might be addicted to cocaine, the employer terminated his employment for breaching the Policy and for compromising the safety of the workplace.
Speaker, «ERISA Fiduciary Liability Insurance: Limiting Exposure for Breach of Duty Claims Negotiating the Policy, Overcoming Coverage Challenges, and Responding to Enforcement and Litigation,» Strafford (Webinar / Teleconference)(December 22, 2009)
As Professor Doug Berman at the Sentencing Law and Policy reports, a Northern District of Iowa judge reduced a defendant's sentence to punish the prosecution for a serious breach of the terms of the plea agreement.
Moreover, the Supreme Court of Canada found the employer didn't fire the employee for the addiction to drugs, but for breaching the employer's drug policy to self ‐ report his drug use... [more]
In an 8 — 1 ruling, the court said the Alberta Human Rights Tribunal was right to conclude that the man was fired for breaching the company's drug policy, not because of his addiction.
in relation to whether an employer's decision to dismiss an employee for a breach of health and safety policy justified dismissal
Special Master to decide pending discovery motions in action brought by issuer of financial guaranty insurance policies for residential mortgage - backed securitization transactions for breach of loan - level representations and warranties when securitizations began to experience increases in delinquencies and defaults in the underlying mortgages
The comments to the Proposed Rules note it was assumed that business associates in compliance with their contracts would have already designated personnel to be responsible for formulating the organization's privacy and security policies, performed a risk analysis, and invested in hardware and software to prevent and monitor for internal and external breaches of protected health information.8 To emphasize the requirement, the risk of criminal and / or civil monetary penalties was referenced as an incentive for organizations to bolster their security and privacy policies.
«The Court emphasized that respect for the conditions of «living together» was a legitimate aim for the measure at issue and that, particularly as the State had a lot of room for manoeuvre («a wide margin of appreciation») as regards this general policy question on which there were significant differences of opinion, the ban imposed by the Law of 11 October 2010 did not breach the Convention.»
This means that the OPC and even the Federal Court will be powerless to stop organizational notification policies designed in a way that allows for repeated mis - classifications of «material breaches».
For one thing, organizations may wish to dust off and revisit their existing corporate data breach / breach of security safeguards policies to ensure that they at least minimally dovetail with the proposed regulations.
The English courts will have exclusive jurisdiction over any claim arising from, or related to, a visit to our Site or any aspect relating to use of your data under the Privacy and Cookies Policy although we retain the right to bring proceedings against you for breach of these conditions in your country of residence or any other relevant country.
Once a file containing an enforcement application is transferred to the Technical Office for Arbitration at the Ministry of Justice, a further review of the documents is conducted to ensure that the award does not breach a number of criteria, including Egyptian public policy.
a b c d e f g h i j k l m n o p q r s t u v w x y z