Beneficiary Access to Services Sample Clauses

Beneficiary Access to Services. 2.8.1. General: The ICDS Plan must provide services to Beneficiaries as follows: 2.8.1.1. Authorize, arrange, coordinate and provide to Beneficiaries timely access to all Medically Necessary Covered Services as specified in Section 2.4 and Appendix A of this Contract, in accordance with the requirements of the Contract and consistent with 42 C.F.R. § 438.206(c), including 2.8.1.1.1. Meeting State standards for timely access to care and services, taking into account the requirements of Section 2.7.9.2 of this Contract and 42 C.F.R. §§ 438.206(c) and 438.68; 2.8.1.1.2. Offering hours of operation that are no less than the hours of operation offered to commercial Beneficiaries or comparable to Medicaid fee-for-service, if the provider serves only Medicaid Beneficiaries; 2.8.1.1.3. Making services available 24 hours a day, 7 days a week, when medically necessary; and
AutoNDA by SimpleDocs
Beneficiary Access to Services. 2.8.1. General: The ICDS Plan must provide services to Beneficiaries as follows: 2.8.1.1. Authorize, arrange, coordinate and provide to Beneficiaries timely access to all Medically Necessary Covered Services as specified in Section 2.4 and Appendix A, in accordance with the requirements of the Contract and consistent with 42 C.F.R. § 438.206(c); 2.8.1.2. Offer adequate choice and availability of primary, specialty, acute care, behavioral health and LTSS Providers that meet CMS and the ODM standards as provided in Section 2.7.6, Proximity Access Standards. 2.8.1.3. Reasonably accommodate persons and shall ensure that the programs and services are as accessible (including physical and geographic access) to a Beneficiary with disabilities as they are to an individual without disabilities. The ICDS Plan and its Network Providers must comply with the ADA (28 C.F.R. § 35.130) and § 504 of the Rehabilitation Act of 1973 (29 U.S.C. § 794) and maintain capacity to deliver services in a manner that accommodates the needs of its Beneficiaries. The ICDS Plan shall have written policies and procedures to assure compliance, including ensuring that physical, communication, and programmatic barriers do not inhibit Beneficiaries with disabilities from obtaining all Covered Services from the ICDS Plan by: 2.8.1.3.1. Providing flexibility in scheduling to accommodate the needs of the Beneficiaries; 2.8.1.3.2. Providing interpreters or translators for Beneficiaries who are deaf and hard of hearing and those who do not speak English; 2.8.1.3.3. Providing large print (at least 16-point font) versions of all written materials to Beneficiaries with visual impairments; 2.8.1.3.4. Ensuring that all written materials are available in formats compatible with optical recognition software; 2.8.1.3.5. Reading notices and other written materials to individuals upon request; 2.8.1.3.6. Assisting Beneficiaries in filling out forms over the telephone; 2.8.1.3.7. Ensuring effective communication to and from individuals with disabilities through email, telephone, and other electronic means; 2.8.1.3.8. TTY, computer-aided transcription services, telephone handset amplifiers, assistive listening systems, closed caption decoders, videotext displays and qualified interpreters for the deaf; and

Related to Beneficiary Access to Services

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Data Services In lieu of any other rates or discounts, the Customer will receive a discount equal to 20% for the following Data Services: Access: Standard VBS3Guide local loop charges for DS-0, DS-1 and DS-3 Access Service.

  • LOAN SERVICES ADDENDUM If a Fund directs the Custodian in writing to perform loan services, the Custodian and the Fund will be bound by the terms of the Loan Services Addendum attached hereto. The Fund shall reimburse Custodian for its fees and expenses related thereto as agreed upon from time to time in writing by the Fund and the Custodian.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!