Access to treatment and data collection Sample Clauses

Access to treatment and data collection. The criteria in this Managed Access Patient Agreement have been used because they formed part of the phase III clinical trial and have been the basis on which the European licence for Vimizim was granted. A distinction has been made between those patients who are naïve to treatment and the cohort of patients who have been on treatment in England or those who will be applicable to have commissioning from NHS England Allowance is also made for children under the age of 5 that may not be able to do some assessments but they should be attempted at least once every 12 months until the age of 5 at which point they become compulsory. It is expected that all patients, who are appropriate for homecare delivery, will receive infusions via home care delivery. This is expected to follow the clinically appropriate initial hospital infusions at the commencement of treatment.
AutoNDA by SimpleDocs
Access to treatment and data collection. The starting rules and regular tests in this Managed Access Patient Agreement have been developed by the clinical experts in HPP together with representatives of a patient organisation and other interested groups. • Children under the age of 5 may not be able to do some of the tests, but they should be tried at least once every 12 months until the age of 5 at which point, they must be done (see Appendix C). • It is expected that all patients, who can have their medicine at home, will receive supply of asfotase alfa via home care delivery. Patients and parent/ guardians will get support to make sure that they are able to inject asfotase alfa safely and effectively at home.

Related to Access to treatment and data collection

  • Data Collection and Reporting 1. Grantee shall develop and use a local reporting unit that will provide an assigned location for all clients served within the Hospital. This information shall also be entered into Client Assignment and Registration (CARE)when reporting on beds utilized at the Hospital.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Data Collection Some downloaded software included in the Materials may generate and collect information about the software and usage and transmit it to Intel to help improve Intel’s products and services. This collected information may include product name, product version, time of event collection, license type, support type, installation status, hardware and software performance, and use. 9.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Facility 13.1 Each Party shall ensure that its facilities are secured at all times.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to Services 1. Subject to DHCS provider enrollment certification requirements, the Contractor shall maintain continuous availability and accessibility of covered services and facilities, service sites, and personnel to provide the covered services through use of DMC certified providers. Such services shall not be limited due to budgetary constraints.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Why We Collect Information and For How Long We are collecting your data for several reasons: · To better understand your needs and provide you with the services you have requested; · To fulfill our legitimate interest in improving our services and products; · To send you promotional emails containing information we think you may like when we have your consent to do so; · To contact you to fill out surveys or participate in other types of market research, when we have your consent to do so; · To customize our website according to your online behavior and personal preferences. The data we collect from you will be stored for no longer than necessary. The length of time we retain said information will be determined based upon the following criteria: the length of time your personal information remains relevant; the length of time it is reasonable to keep records to demonstrate that we have fulfilled our duties and obligations; any limitation periods within which claims might be made; any retention periods prescribed by law or recommended by regulators, professional bodies or associations; the type of contract we have with you, the existence of your consent, and our legitimate interest in keeping such information as stated in this Policy.

Time is Money Join Law Insider Premium to draft better contracts faster.