Access to Effective Health Services for the Vulnerable Population Sample Clauses

Access to Effective Health Services for the Vulnerable Population. Improving access to effective health services for the Vulnerable Population by: 1.1 the implementation of a unified and integrated monitoring and follow-up system for children with acute malnutrition complemented with advanced malnutrition screening and community surveillance in priority Departments; 1.2 the implementation of an integrated care model with advanced use of telemedicine to reduce lethality from extreme morbidity cases in pregnant women; 1.3 the implementation of an integrated care network for better targeting of women at risk of developing breast cancer to achieve higher levels of screening and improve early detection of the disease and the timeliness in initiation of treatment; 1.4 the implementation of integrated strategies to achieve effective access to antiretroviral treatment and comprehensive care for Eligible Migrants with HIV enrolled in the SGSSS subsidiary regime; and 1.5 the roll out of multidisciplinary Primary Health Care (“PHC”) in Territorial Entities.
AutoNDA by SimpleDocs

Related to Access to Effective Health Services for the Vulnerable Population

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Clinical Management for Behavioral Health Services (CMBHS) System 1. request access to CMBHS via the CMBHS Helpline at (000) 000-0000. 2. use the CMBHS time frames specified by System Agency. 3. use System Agency-specified functionality of the CMBHS in its entirety. 4. submit all bills and reports to System Agency through the CMBHS, unless otherwise instructed.

  • Liability for Failure to Stop Payment of Preauthorized Transfers If you order us to stop payment of a preauthorized transfer three (3) business days or more before the transfer is scheduled and we do not do so, we will be liable for your losses or damages.

  • Liability for Failure to Stop Payment of Preauthorized Transfer If you order us to stop one of these payments 3 business days or more before the transfer is scheduled, and we do not do so, we will be liable for your losses or damages.

  • File Management and Record Retention relating to CRF Eligible Persons or Households Grantee must maintain a separate file for every applicant, Eligible Person, or Household, regardless of whether the request was approved or denied. a. Contents of File: Each file must contain sufficient and legible documentation. Documents must be secured within the file and must be organized systematically.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!