To ensure the safety and health of the public, the following procedures are in effect for all school board meetings held at the Kelly Leadership Center:

  1. Seating capacity requirements will be enforced for social distancing.
  2. All bags are subject to search, a bag control area will be located in front of the Kelly Leadership Center.
  3. Masks are mandatory for entry and will be provided at the bag control area if required.
  4. Participants refusing to wear a mask, without medical or religious exemption, will be asked to leave the building by PWCS security.
  5. PWCS security will control access to the meeting room at the capacity indicated.
  6. If a participant leaves the meeting room for any reason, the seats will be taken by those waiting.
  7. The overflow capacity will be directed to the atrium where the meeting will be broadcast.
  8. Once full capacity is reached, additional participants will not be allowed to enter the building.
  9. If the meeting room is full, citizen comment speakers in the atrium will be allowed to enter the meeting room when called and must leave the meeting room after speaking.
  10. Appropriate decorum will be expected from all participants. Those who do not follow directions or adhere to procedures may be asked to leave the building.
  11. No signs, posters, placards, banners or similar items will be permitted in the school board meeting room during a school board meeting, hearing or town hall, except when it is a presentation of the school board. student approved by PWCS and only when such signs, posters, placards, banners or the like do not obstruct the view of others or pose a threat to the smooth running of the meeting and the safety of others.
  12. Speakers must respect the privilege granted by the school board by using commonly accepted rules of courtesy, respect, civility and decorum. The use of obscenity or defamation is strictly prohibited and will be declared inadmissible.


Source link

Previous

From AI to DevTestOps, what's hot and why

Next

New Nagios software bugs could allow hackers to take over IT infrastructure

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also