Access Screening Sample Clauses

Access Screening 
AutoNDA by SimpleDocs

Related to Access Screening

  • Screening 3.13.1 Refuse containers located outside the building shall be fully screened from adjacent properties and from streets by means of opaque fencing or masonry walls with suitable landscaping.

  • Background Screening VENDOR shall comply with all requirements of Sections 1012.32 and 1012.465, Florida Statutes, and all of its personnel who (1) are to be permitted access to school grounds when students are present, (2) will have direct contact with students, or (3) have access or control of school funds, will successfully complete the background screening required by the referenced statutes and meet the standards established by the statutes. This background screening will be conducted by SBBC in advance of VENDOR or its personnel providing any services under the conditions described in the previous sentence. VENDOR shall bear the cost of acquiring the background screening required by Section 1012.32, Florida Statutes, and any fee imposed by the Florida Department of Law Enforcement to maintain the fingerprints provided with respect to VENDOR and its personnel. The parties agree that the failure of VENDOR to perform any of the duties described in this section shall constitute a material breach of this Agreement entitling SBBC to terminate immediately with no further responsibilities or duties to perform under this Agreement. VENDOR agrees to indemnify and hold harmless SBBC, its officers and employees from any liability in the form of physical or mental injury, death or property damage resulting from VENDOR’s failure to comply with the requirements of this section or with Sections 1012.32 and 1012.465, Florida Statutes.

  • Message Screening 9.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from Global Connection local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the Global Connection switching system has a valid signaling relationship.

  • Health Screening The Contractor shall conduct a Health Needs Screen (HNS) for new members that enroll in the Contractor’s plan. The HNS will be used to identify the member’s physical and/or behavioral health care needs, special health care needs, as well as the need for disease management, care management and/or case management services set forth in Section 3.8. The HNS may be conducted in person, by phone, online or by mail. The Contractor shall use the standard health screening tool developed by OMPP, i.e., the Health Needs Screening Tool, but is permitted to supplement the OMPP Health Needs Screening Tool with additional questions developed by the Contractor. Any additions to the OMPP Health Needs Screening Tool shall be approved by OMPP. The HNS shall be conducted within ninety (90) calendar days of the Contractor’s receipt of a new member’s fully eligible file from the State. The Contractor is encouraged to conduct the HNS at the same time it assists the member in making a PMP selection. The Contractor shall also be required to conduct a subsequent health screening or comprehensive health assessment if a member’s health care status is determined to have changed since the original screening, such as evidence of overutilization of health care services as identified through such methods as claims review. Non-clinical staff may conduct the HNS. The results of the HNS shall be transferred to OMPP in the form and manner set forth by OMPP. As part of this contract, the Contractor shall not be required to conduct HNS for members enrolled in the Contractor’s plan prior to January 1, 2017 unless a change in the member’s health care status indicates the need to conduct a health screening. For purposes of the HNS requirement, new members are defined as members that have not been enrolled in the Contractor’s plan in the previous twelve (12) months. Data from the HNS or NOP form, current medications and self-reported medical conditions will be used to develop stratification levels for members in Hoosier Healthwise. The Contractor may use its own proprietary stratification methodology to determine which members should be referred to specific care coordination services ranging from disease management to complex case management. OMPP shall apply its own stratification methodology which may, in future years, be used to link stratification level to the per member per month capitation rate. The initial HNS shall be followed by a detailed Comprehensive Health Assessment Tool (CHAT) by a health care professional when a member is identified through the HNS as having a special health care need, as set forth in Section 4.2.4, or when there is a need to follow up on problem areas found in the initial HNS. The detailed CHAT may include, but is not limited to, discussion with the member, a review of the member’s claims history and/or contact with the member’s family or health care providers. These interactions shall be documented and shall be available for review by OMPP. The Contractor shall keep up-to-date records of all members found to have special health care needs based on the initial screening, including documentation of the follow-up detailed CHAT and contacts with the member, their family or health care providers.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Authorized User Overview and Mini-Bid Process Project Based IT Consulting Services Contracts enable Authorized Users to use a competitive Mini-bid Process to acquire Services on an as-needed basis, for qualified IT Projects. Project Based IT Consulting Services may include, but will not be limited to projects requiring: analysis, data classification, design, development, testing, quality assurance, security and associated training for Information Technology based applications. See section 1.3 Out of Scope Work for a listing of projects expressly excluded from the scope of this Contract. An Authorized User Agreement for Project Based IT Consulting Services will be governed first by the terms and conditions specified in the OGS Centralized Contract and second by terms and conditions added to the Authorized User Statement of Work. Additional terms and conditions shall not conflict with or modify the terms and conditions of the OGS Centralized Contract. NYS Executive Agencies must adhere to all internal processes and approvals including, as required, approval from NYS Office of Information Technology Services. Other Authorized Users must adhere to their own internal processes and approvals. In accordance with Appendix B, section 28, Modification of Contract Terms, an Authorized User may add additional required terms and conditions to this Mini-Bid and resultant Authorized User Agreement only if such terms and conditions (1) are more favorable to the Authorized User and (2) do not conflict with or supersede the OGS Centralized Contract terms and conditions. Examples of additional terms and conditions include: • Expedited delivery timeframe; • Additional incentives, such as discount for expedited payment/Procurement Card use; and • Any additional requirements imposed by the funding source or Federal law.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!