Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01
Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Fraud and Abuse The Company, the Owners, the Physician Employees and all other persons and entities providing professional services for or on behalf of the Company, to their actual knowledge, have not engaged in any activities that are prohibited under 42 U.S.C. ss.ss. 1320a-7, 7a or 7b or 42 U.S.C. ss. 1395nn (subject to the excexxxxxs set forth in such legislation) or the regulations promulgated thereunder or pursuant to similar state or local statutes or regulations or that are prohibited by rules of professional conduct, including, but not limited to, the following: (a) knowingly and willfully making or causing to be made a false statement or representation of a material fact in any application for any benefit or payment; (b) knowingly and willfully making or causing to be made a false statement or representation of a material fact for use in determining rights to any benefit or payment; (c) failure to disclose knowledge by a Medicare or Medicaid claimant of the occurrence of any event affecting the initial or continued right to any benefit or payment on their own behalf or on behalf of another with intent to fraudulently secure such benefit or payment; (d) knowingly and willfully offering, paying or soliciting or receiving any remuneration (including any kickback, bribe or rebate), directly or indirectly, overtly or covertly, in cash or in kind (i) in return for referring an individual to a person for the furnishing or arranging for the furnishing of any item or service for which payment may be made in whole or in part by Medicare or Medicaid or (ii) in return for purchasing, leasing or ordering or arranging or recommending purchasing, leasing or ordering any good, facility, service or item for which payment may be made in whole or in part by Medicare or Medicaid; or (e) referring a patient for designated health services (as defined in 42 U.S.C. ss. 1395nn) to or providing designated health services to a patient upon a referral from an entity or person with which the physician or an immediate family member has a financial relationship and to which no exception under 42 U.S.C. ss. 1395nn applies. SECTION 3.32. PAYORS. Schedule 3.32 sets forth a true, correct and complete list of the names and addresses of each Payor, including any private pay patient as a single payor, of the Company's services that accounted for more than 5% of the aggregate revenues of the Company in the five previous fiscal years. Except as set forth in Section 3.32, the Company has good relations with such Payors, and none of such Payors has notified the Company that it intends to discontinue its relationship with the Company or to deny any claims submitted to such Payor for payment.
COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.
Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.
Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200
Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. B. Grantee shall use the Texas Abuse Hotline Website located at xxxxx://xxx.xxxxxxxxxxxxxx.xxx/Login/Default.aspx as required by the System Agency. Grantee shall retain reporting documentation on site and make it available for inspection by the System Agency.
Notice of Privacy Practices Business Associate shall abide by the limitations of Covered Entity’s Notice of which it has knowledge. Any use or disclosure permitted by this Agreement may be amended by changes to Covered Entity’s Notice; provided, however, that the amended Notice shall not affect permitted uses and disclosures on which Business Associate relied prior to receiving notice of such amended Notice.
Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.
Child Abuse Reporting Requirement Grantee will: a. comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. b. develop, implement and enforce a written policy that includes at a minimum the System Agency’s Child Abuse Screening, Documenting, and Reporting Policy for Grantees/Providers and train all staff on reporting requirements. c. use the System Agency Child Abuse Reporting Form located at xxxxx://xxx.xxxx.xxxxx.xx.xx/Contact Us/report abuse.asp as required by the System Agency. d. retain reporting documentation on site and make it available for inspection by the System Agency.