Sentences with phrase «information on company policies»

When you get a job offer, you may also receive information on company policies, benefits, etc..

Not exact matches

Important factors that could cause actual results to differ materially from those reflected in such forward - looking statements and that should be considered in evaluating our outlook include, but are not limited to, the following: 1) our ability to continue to grow our business and execute our growth strategy, including the timing, execution, and profitability of new and maturing programs; 2) our ability to perform our obligations under our new and maturing commercial, business aircraft, and military development programs, and the related recurring production; 3) our ability to accurately estimate and manage performance, cost, and revenue under our contracts, including our ability to achieve certain cost reductions with respect to the B787 program; 4) margin pressures and the potential for additional forward losses on new and maturing programs; 5) our ability to accommodate, and the cost of accommodating, announced increases in the build rates of certain aircraft; 6) the effect on aircraft demand and build rates of changing customer preferences for business aircraft, including the effect of global economic conditions on the business aircraft market and expanding conflicts or political unrest in the Middle East or Asia; 7) customer cancellations or deferrals as a result of global economic uncertainty or otherwise; 8) the effect of economic conditions in the industries and markets in which we operate in the U.S. and globally and any changes therein, including fluctuations in foreign currency exchange rates; 9) the success and timely execution of key milestones such as the receipt of necessary regulatory approvals, including our ability to obtain in a timely fashion any required regulatory or other third party approvals for the consummation of our announced acquisition of Asco, and customer adherence to their announced schedules; 10) our ability to successfully negotiate, or re-negotiate, future pricing under our supply agreements with Boeing and our other customers; 11) our ability to enter into profitable supply arrangements with additional customers; 12) the ability of all parties to satisfy their performance requirements under existing supply contracts with our two major customers, Boeing and Airbus, and other customers, and the risk of nonpayment by such customers; 13) any adverse impact on Boeing's and Airbus» production of aircraft resulting from cancellations, deferrals, or reduced orders by their customers or from labor disputes, domestic or international hostilities, or acts of terrorism; 14) any adverse impact on the demand for air travel or our operations from the outbreak of diseases or epidemic or pandemic outbreaks; 15) our ability to avoid or recover from cyber-based or other security attacks, information technology failures, or other disruptions; 16) returns on pension plan assets and the impact of future discount rate changes on pension obligations; 17) our ability to borrow additional funds or refinance debt, including our ability to obtain the debt to finance the purchase price for our announced acquisition of Asco on favorable terms or at all; 18) competition from commercial aerospace original equipment manufacturers and other aerostructures suppliers; 19) the effect of governmental laws, such as U.S. export control laws and U.S. and foreign anti-bribery laws such as the Foreign Corrupt Practices Act and the United Kingdom Bribery Act, and environmental laws and agency regulations, both in the U.S. and abroad; 20) the effect of changes in tax law, such as the effect of The Tax Cuts and Jobs Act (the «TCJA») that was enacted on December 22, 2017, and changes to the interpretations of or guidance related thereto, and the Company's ability to accurately calculate and estimate the effect of such changes; 21) any reduction in our credit ratings; 22) our dependence on our suppliers, as well as the cost and availability of raw materials and purchased components; 23) our ability to recruit and retain a critical mass of highly - skilled employees and our relationships with the unions representing many of our employees; 24) spending by the U.S. and other governments on defense; 25) the possibility that our cash flows and our credit facility may not be adequate for our additional capital needs or for payment of interest on, and principal of, our indebtedness; 26) our exposure under our revolving credit facility to higher interest payments should interest rates increase substantially; 27) the effectiveness of any interest rate hedging programs; 28) the effectiveness of our internal control over financial reporting; 29) the outcome or impact of ongoing or future litigation, claims, and regulatory actions; 30) exposure to potential product liability and warranty claims; 31) our ability to effectively assess, manage and integrate acquisitions that we pursue, including our ability to successfully integrate the Asco business and generate synergies and other cost savings; 32) our ability to consummate our announced acquisition of Asco in a timely matter while avoiding any unexpected costs, charges, expenses, adverse changes to business relationships and other business disruptions for ourselves and Asco as a result of the acquisition; 33) our ability to continue selling certain receivables through our supplier financing program; 34) the risks of doing business internationally, including fluctuations in foreign current exchange rates, impositions of tariffs or embargoes, compliance with foreign laws, and domestic and foreign government policies; and 35) our ability to complete the proposed accelerated stock repurchase plan, among other things.
Last week, the Fortune data team revealed that we spent the months leading up to the launch of this year's Fortune 500 collecting information about the diversity and inclusion policies at each company on the list.
(Because Google's advertising network relies on people voluntarily giving it as much information as possible, chairman Eric Schmidt has joked that the company's policy is to «get right up to the creepy line and not cross it.»)
They contend that its open policies prove the benefits of experimenting with data and using information to establish a «direct relationship between an individual's decisions and their impact on the business» — something the grocery chain accomplishes by giving each employee high - level access to the company's financial data, and therefore a greater stake in the business.
The ability to delete browsing history gives users some element of control over the information Facebook gathers on them and brings the company more in line with its competitors» policies.
In the earlier stages of a company, it's possible that policies are not rigorous enough and the guardrails on various APIs are not robust enough that this kind of information can just get out in the open without additional scrutiny, allowing firms to take advantage of those shortcomings.
Kogan seemed most comfortable during the session when he was laying into Facebook's platform policies — perhaps unsurprisingly, given how the company has sought to paint him as a rogue actor who abused its systems by creating an app that harvested data on up to 87 million Facebook users and then handing information on its users off to third parties.
Pressed on why he didn't inform users, in 2015, when Facebook says it found out about this policy breach, Zuckerberg avoided a direct answer — instead fixing on what the company did (asked Cambridge Analytica and the developer whose app was used to suck out data to delete the data)-- rather than explaining the thinking behind the thing it did not do (tell affected Facebook users their personal information had been misappropriated).
Effective on June 16, 2015, the Corporate Governance Committee and the Board of Directors of the Company amended and restated the Code to, among other things, reflect the following amendments: (1) added a new Whistleblower Exception provision under the Confidentiality section; (2) modified the provision regarding Protection of Covered Persons to clarify that such protections apply to any Covered Person who provides information or makes other disclosures that are protected under whistleblower provisions; and (3) updated the policy reference to the Franklin Templeton Investments Social Media Guidelines Ppolicy reference to the Franklin Templeton Investments Social Media Guidelines PolicyPolicy.
We encourages companies to review the information regarding our policies and methodologies used in developing our analysis on the Guidelines page.
While most brick - and - mortar retailers will only have access to credit card information, or perhaps some personal information through consumer loyalty programs, analysis of Amazon's privacy policy shows that the company collects information on shipping recipients, Internet protocol (IP) addresses of customers, personal information in a user's profile and even the e-mail addresses of friends.
By submitting your contact information you are providing express written consent electronically via E-sign to our Terms of Use and Privacy Policy, and to share your information with up to 5 partners from our Approved Partner Network and for them to contact you (including through automated means; e.g. autodialing, text and pre-recorded messaging) via telephone, mobile device (including SMS and MMS) and / or email, even if your telephone number provided above is currently listed on any state, federal or corporate Do Not Call list and even if your phone company may charge you for the call.
However, our Privacy Policy does not cover information collected on those third party sites, and these third party companies are not bound by our Privacy Policy.
[Box 9] OIS - China - Chinese Science and Technology Policy Delegation Visit, 1978 Zhongshan University Delegation Visit, 1979 AAAS Popularization of Science Delegation to China, 1980 CAST Science Writers Delegation to US, 1981 AAAS Environmental Planning Delegation to China, 1981 US - China Conference on Energy Resources and Environment, 1982 Interferon Study (Proposed), 1982 CAST Delegation to US, 1982 CAST Quality Control Delegation to US, 1982 Rumenant Productivity Symposium - US Papers, 1983 Rumenant Productivity Symposium - Chinese Papers, 1983 Photo Album of Address by Song Jian, 1985 AAAS Board of Directors Delegation to China, 1985 Chinese Delegation Visit (IIE), 1986 US Fish and Wildlife Service Delegation to China, 1986 FASAS International Climate Change Symposium (Proposal), 1986 CAST Delegation to US, 1986 Background Political Information, 1987 Law / Science Short Course (Proposal), 1987 Collected Information and Papers on Chinese Water Management, 1987 CAST Water Management Delegation to US, 1987 AAAS Water Management Delegation to China, 1987 AAAS Water Management Delegation to China - Follow - up, 1988 CAST Petrochemical Engineer Delegation to US (Proposal), 1987 Pacific Rim Symposium (Proposal), 1987 Science and Technology Advising Seminar (Proposal), 1988 - 1989 AAAS / ABA Lawyers and Scientists Delegation to China, 1988 China Symposium at 1989 AAAS Annual Meeting, 1988 - 1989 Medical Instrument Maintenance and Repair, 1989 Fang Li Zhi, 1988 - 1989 Amnesty International Reports on Chinese Arrests, 1989 Correspondence re: June 1989 Events in China, 1989 Consortium of Affiliates for International Programs, 1989 China - FASAS Symposium on Environmental Protection in Developing Countries, 1989 FASAS Symposium Chinese Papers, 1989 PRC Joint Commission Visit, 1989 Tibet, 1987 Liz Levey Misc Correspondence, 1982 - 1990 Chinese Code of Ethics, 1986 China Tech Company Information, (undated) AAAS / CAST Exchange Programs, 1978 - 1987 Correspondence with CAST International Director Wang Zheng, 1981 - 1982 Correspondence with CAST, 1981 - 1989 James Hartnett Complaint to CAST, 1988 - 1989 Chinese Academy of Sciences, 1987 Hong Kong Association for the Advancement of Science and Technology, 1987 - 1988 Correspondence with Chinese Embassy, 1982 - 1987 NAS China Committee, 1982 - 1986 Financial Aid for Chinese Students, 1987 Misc Articles and General Background Information, 1978 - 1989 Misc., 1982 - 1989 Presentation Transparencies, 1988 Elzinga, Aant.
The main impact of the ruling on diagnostics companies, according to Robert Cook - Deegan, director of a genetics policy institute at Duke University in Durham, North Carolina, will be to make it harder to gain exclusive control of DNA information.
In the U.S., we already have legislation that prevents health insurance companies from discriminating against individuals based on genetic information, but it doesn't apply to life insurance or long - term care policies.
A Legal and Policy Making Guide for School Boards on International Student Travel,» provides vital information explaining the three types of international student travel, which include school sponsored and school district managed, school sponsored and tour - company managed, and non-school sponsored / private trips, providing guidance on recommended district - led policies for each.
The company's privacy policy is outlined on its website and offers options for allowing the company to share your information or requesting that they delete it.
A preliminary step before you do anything else is to call the insurance company's policy holders service department and give them the policy number on the statement and whatever information they request from you.
In these cases, the insurance company believes that the person who purchased the policy falsified information on the life insurance application in order to qualify for the policy.
Get specific information in writing from the company such as how long they have been in business, where they are located (not just a P.O. Box), how many customers they have, what their refund policy is (read it thoroughly), how long it takes to get paid and if there are any restrictions on payments, etc..
If a policy is issued to you, the premium will be based on the information, rates and rules in effect at that time for the issuing insurance company.
With this in mind, Lincoln General Insurance Company has provided detailed information on its website for any policy holder in terms of how and where to forward any loss run requests.
Online term policy will not give me claim settlement: If you fill all the information correctly, pay the premium on time, check details for extra riders you might need and get a medical checkup done, there is no reason that the company won't settle your claim.
If you are dishonest about any health conditions that you have and you're accepted for coverage without disclosing that information, there is a chance that the insurance company could refuse to payout on the policy.
At large employers, your benefits packet is loaded with information on health insurance, dental insurance, vision insurance, disability insurance, life insurance, wellness programs, stock purchase plans, flexible spending accounts, health savings accounts, time off and leave policies, and company retirement plans.
Encore Capital Group, Inc. (NASDAQ: ECPG), an international specialty finance company, today announced it has enhanced its credit reporting policy for collections tradelines, dramatically shortening the time certain negative information remains on a consumer's credit report.
Under these provisions, a Vermont Life Insurance company can question any information you stated on your Vermont Life Insurance application for up to two years from the purchase of the policy.
By submitting your contact information you are providing express written consent electronically via E-sign to our Terms of Use and Privacy Policy, and to share your information with up to 5 partners from our Approved Partner Network and for them to contact you (including through automated means; e.g. autodialing, text and pre-recorded messaging) via telephone, mobile device (including SMS and MMS) and / or email, even if your telephone number provided above is currently listed on any state, federal or corporate Do Not Call list and even if your phone company may charge you for the call.
Please read and review the Capital Bank Privacy Policy and the Capital Bank Online Privacy Policy below for more detailed information on how and why financial companies can share information from or about you, and how and whether you can limit this sharing.
Under these provisions, a South Carolina Life Insurance company can question any information you stated on your South Carolina Life Insurance application for up to two years from the purchase of the policy.
While checking for life insurance cover online, you can read the reviews of the policyholder online and can get every detailed information about the policy plans and benefits on the company's website.
CASA Homepage Latest Shelter Information The Animals Need Us Adopt a Pet Adoption Fees & Details Current Adoption Specials Pit Bull Specific Adoption Application 10 Reasons to Adopt an Adult Cat Happy Tails / Adopted Pets Services Pet Adoption Animal Control & Stray Dogs Running at Large Report Abuse / Neglect County Pet Licensing Live Trap Rental Giving Up a Pet Courtesy Listings for Pet Rehoming Feral / Barn Cats Pet Microchipping About Us Our Mission History of CASA Our Motivation (video) Shelter Staff Board of Directors Public Shelter Hours Contact Us News CASA Newsletter CASA in the News Calendar & Events Virtual Calendar Event Posters Friends of CASA Helpful Resources Low - Cost Pet Spay & Neuter Feral Cat Assistance Free Feral Spay & Neuter Help for Wildlife Other Local Shelters & Animal Welfare Organizations Missing Pet Resources Microchip Companies Financial / Medical Assistance Options For Personal Pets 24 hr Emergency Vet Clinics (local) Personal Pet Food Bank FAQ Stray Holds Euthanasia Defining Adoptability Adoption Process Spay & Neuter options Medical Included Stray Animals at CASA Behavior Assessments Pit Bull Placement Policies Volunteer Help at the Shelter Become a Foster Home Join the Friends of CASA (Fundraising & Events) How to Donate Help Fund our Mission Shelter Wish List Purchase CASA Items Donate a Bed Donate Food & Supplies Sponsor a Homeless Pet Join the CASA Membership Donate a Car or Boat Lost & Found Pets Missing Pets on and Around Camano Privately Found Pets Online Missing Pet Database Lost and Found Pets at CASA Featured Pet in Need Help Our Featured Pet in Need CASA Shop Forever Home Music CD CASA Logo Gear Donate a Bed Annual Auction Event Information Auction Item Catalog Admission / Tickets Auction Documents Donor Forms Event Sponsors Donor Forms Event Poster Direct Links / Misc Island County Code CASA Color Page for Kids
The law's reach stretches well beyond California to require a person or company in the United States (and conceivably the world) that operates websites collecting personally identifiable information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals with whom it is being shared, and to comply with this policy.
Use of this Site signifies your consent, as well as the consent of the company for whom you use the Site and whose information you submit (if any), to this on - line Privacy Policy, including the collection and use of information by The Hotel Erwin, as described in this statement, and also signifies agreement to the terms of use for the Site.
Ethical Consumer considered that a good policy on this matter must at least include: a) a list of hazardous and polluting chemicals, b) clear and dated targets to eliminate discharge of all hazardous and polluting chemicals, c) the requirement that suppliers disclose information on the release of hazardous chemicals, d) the public disclosure of information on polluting and hazardous substances, and e) a discussion on the company's progress in finding alternatives.
Costs are defined in a variety of ways and under a variety of assumptions that affect their value ► Cost types include: ► administrative costs of planning, management, monitoring, audits, accounting, reporting, clerical activities, etc. associated with a project or program; ► damage costs to ecosystems, economies and people due to negative effects from climate change; ► implementation costs of changing existing rules and regulation, capacity building efforts, information, training and education, etc. to put a policy into place; ► private costs are carried by individuals, companies or other private entities that undertake the action, where ► social costs include additionally the external costs on the environment and on society as a whole.
Our Labor & Employment attorneys provide advice and representation on a wide range of employment related matters affecting technology and emerging growth companies, including wage / hour compliance (including classification audits), handbooks, policy manuals and drug testing plans, employment and independent contractor agreements, terminations, severance plans and releases, sexual harassment training, protection of trade secrets and confidential business information, leaves of absence and return to work issues, and IP ownership and assignment issues.
EPIC seems concerned about the «Clear Notice and Personal Choice» policy, which it dubs both «weird» and «remarkable,» based on an apparent concern that it allows agencies to «routinely disclose personal information of citizens to private companies
Securities regulators in Manitoba, New Brunswick, Newfoundland and Labrador, Northwest Territories, Nova Scotia, Nunavut, Ontario, Quebec, and Saskatchewan did adopt the rules requiring companies to disclose, on an annual basis, information on policies relating to the identification and nomination of women directors, targets for women on boards and in executive officer positions as well as the number and percentage of women on the issuer's board of directors and in executive officer positions.
[21] Gillian Hadfield offers fascinating insight on the challenges that companies like Google, Mozilla and Cisco Systems face in obtaining legal services: Gillian Hadfield, «Legal Infrastructure and the New Economy,» I / S: A Journal of Law and Policy for the Information Society 8 (2012): 1 - 59, http://ssrn.com/abstract=1567712.
The regulation does not specify the form that the program must take, but requires that it be «designed to perform the following core cybersecurity functions:» (1) identify internal and external cyber risks by, at a minimum, identifying the Nonpublic Information stored on the Covered Entity's Information Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation stored on the Covered Entity's Information Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation Systems, the sensitivity of such Nonpublic Information, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation, and how and by whom such Nonpublic Information may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation may be accessed; (2) use defensive infrastructure and the implementation of policies and procedures to protect the company's Information Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation Systems and the Nonpublic Information stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation stored on those Information Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation Systems, from unauthorized access, use or other malicious acts; (3) detect Cybersecurity Events - which are defined broadly to include «any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation System or information stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oinformation stored on an Information System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting oInformation System;» (4) respond to identified or detected Cybersecurity Events to mitigate any negative effects; (5) recover from Cybersecurity Events and restore normal operations and services; and (6) fulfill all regulatory reporting obligations.
This evolved after many decades of litigation, in the late 1800s and early 1900s, between survivors of people who died and life insurance companies who sought the right to refuse to pay for any inaccuracy in the information provided to underwrite the policy (even if unrelated to the actual cause of death) due to fraud, and for suicide on the theory that it was a premeditated way to cheat the company.
Engaged to counsel a multinational construction company on information management and e-discovery best practices, and assisted in substantial revisions to its information management and litigation hold policies.
• Provided support to global sales offices by managing, drafting, reviewing, redlining, and negotiating both standard and non-standard agreements including nondisclosure, professional services, independent contractor, manufacturing, software licensing (both on premise and SaaS), customer / sales, supplier, joint development, and distributor contracts • Maintained contractual records and documentation, such as receipt and control of all contract correspondence, customer contact information sheets, contractual changes, and other documents for all projects • Worked with risk management department to coordinate contractual insurance requirements • Worked with finance department to insure adherence to broader finance and risk requirements such as revenue recognition, pricing and discounting policies and other relevant requirements • Worked with relevant sales and business team and advise regarding legal issues and risks related to various business transactions • Ensured proper completion of a wide variety of agreements • Monitored compliance by company employees with established procedures • Ensured that signed contracts are communicated to all relevant parties to provide contract visibility and awareness
• Employment contracts and social media policies should clearly state that an employee's LinkedIn presence is a database of proprietary trade information built on the employer's behalf, using company equipment, and during working hours for which compensation is provided.
A good policy will spell out clear rules on the dividing lines between business and personal use and cover the right for the company to install monitoring software or perform a remote lock or wipe of data that could include personal information.
The section below provides Information and tips on Insurance policies, how they work and insurance companies in India.
Get all information on the best life insurance policies and companies in India, advantages of life insurance and how to invest in life insurance.
a b c d e f g h i j k l m n o p q r s t u v w x y z