Access Screening Sample Clauses

Access Screening 
AutoNDA by SimpleDocs

Related to Access Screening

  • Screening After you sign and date the consent document, you will begin screening. The purpose of the screening is to find out if you meet all of the requirements to take part in the study. Procedures that will be completed during the study (including screening) are described below. If you do not meet the requirements, you will not be able to take part in the study. The study investigator or study staff will explain why. As part of screening, you must complete all of the items listed below: • Give your race, age, gender, and ethnicity • Give your medical history o You must review and confirm the information in your medical history questionnaire • Give your drug, alcohol, and tobacco use history • Give your past and current medication and treatment history. This includes any over-the-counter or prescription drugs, such as vitamins, dietary supplements, or herbal supplements, taken in the past 28 days • Height and weight will be measured • Physical exam will be done • Electrocardiogram (ECG) will be collected. An ECG measures the electrical activity of the heart • You may be tested for COVID-19 o Blood tests for human immunodeficiency virus (HIV), hepatitis B, and hepatitis C o Blood tests to see how your blood clots ▪ Fibrinogen ▪ PT/INR/aPTT o Blood tests for amylase and lipase (enzymes that help with digestion, Part B only) o Blood tests for a lipid (fats) panel (Part B only) ▪ Total cholesterol ▪ Triglycerides ▪ HDL ▪ Direct HDL o Blood tests to check your thyroid function (Part B and Part C only) ▪ TSH ▪ Free T4 o Urine to test for drugs of abuse (illegal and prescription) o Urine tests to check your albumin/ creatinine ratio o Females who have not had a period for at least 12 months in a row will have a blood hormone test to confirm they cannot have children • The study investigator may decide to do an alcohol breath test • The use of proper birth control will be reviewed (males only) • You will be asked “How do you feel?” HIV, hepatitis B, and hepatitis C will be tested at screening. If anyone is exposed to your blood during the study, you will have these tests done again. If you have a positive test, you cannot be in or remain in the study. HIV is the virus that causes acquired immunodeficiency syndrome (AIDS). If your HIV test is positive, you will be told about the results. It may take weeks or months after being infected with HIV for the test to be positive. The HIV test is not always right. Having certain infections or positive test results may have to be reported to the State Department of Health. This includes results for HIV, hepatitis, and other infections. If you have any questions about what information is required to be reported, please ask the study investigator or study staff. Although this testing is meant to be private, complete privacy cannot be guaranteed. For example, it is possible for a court of law to get health or study records without your permission.

  • Background Screening VENDOR shall comply with all requirements of Sections 1012.32 and 1012.465, Florida Statutes, and all of its personnel who (1) are to be permitted access to school grounds when students are present, (2) will have direct contact with students, or (3) have access or control of school funds, will successfully complete the background screening required by the referenced statutes and meet the standards established by the statutes. This background screening will be conducted by SBBC in advance of VENDOR or its personnel providing any services under the conditions described in the previous sentence. VENDOR shall bear the cost of acquiring the background screening required by Section 1012.32, Florida Statutes, and any fee imposed by the Florida Department of Law Enforcement to maintain the fingerprints provided with respect to VENDOR and its personnel. The parties agree that the failure of VENDOR to perform any of the duties described in this section shall constitute a material breach of this Agreement entitling SBBC to terminate immediately with no further responsibilities or duties to perform under this Agreement. VENDOR agrees to indemnify and hold harmless SBBC, its officers and employees from any liability in the form of physical or mental injury, death or property damage resulting from VENDOR’s failure to comply with the requirements of this section or with Sections 1012.32 and 1012.465, Florida Statutes.

  • Message Screening 7.4.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from MRC local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the MRC switching system has a valid signaling relationship. 7.4.4.4.2 BellSouth shall set message screening parameters so as to pass valid messages from MRC local or tandem switching systems destined to any signaling point or network accessed through BellSouth’s SS7 network where the MRC switching system has a valid signaling relationship. 7.4.4.4.3 BellSouth shall set message screening parameters so as to accept and pass/send valid messages destined to and from MRC from any signaling point or network interconnected through BellSouth’s SS7 network where the MRC SCP has a valid signaling relationship.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!