Data Access and Transfer Sample Clauses

Data Access and Transfer. The Participating Provider agrees that: (1) complete and accurate reporting of quality measures using a CMS web interface each reporting period by the ACO will qualify ACO participants with Physician Quality Reporting System (PQRS) eligible Participating Providers to earn a PQRS incentive payment and to avoid the PQRS payment adjustment, and may satisfy the requirements of some other Medicare quality reporting initiatives; and (2) that the ACO’s inability to completely and accurately report quality data may have consequences including the inability to share savings and the application of the Physician Quality Reporting System (PQRS) payment adjustment, which would affect Medicare payment amounts for eligible Participating Providers billing through the Participant TIN(s). The Participating Provider shall allow the ACO to access its Electronic Medical Record systems (EMR) to collect claims data, utilization management data, payment data, and administrative or operational and clinical data in real time. Additionally, the Participating Provider agrees to an initial upload of attributed beneficiary historical data from the point of the attributed beneficiary’s first visit. The Participating Provider, with the assistance of the ACO, shall submit the data to the ACO or to CMS, as reasonably directed by the ACO. All data collection and dissemination shall be covered by the BAA attached hereto as Exhibit C and the “Privacy and Security Laws”.
AutoNDA by SimpleDocs

Related to Data Access and Transfer

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Payment and Transfer Unless otherwise mutually agreed, all transfers of funds hereunder shall be in immediately available funds. All Securities transferred by one party hereto to the other party (i) shall be in suitable form for transfer or shall be accompanied by duly executed instruments of transfer or assignment in blank and such other documentation as the party receiving possession may reasonably request, (ii) shall be transferred on the book-entry system of a Federal Reserve Bank, or (iii) shall be transferred by any other method mutually acceptable to Seller and Buyer.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Local Control Center, Metering and Telemetry The NTO shall operate, pursuant to ISO Tariffs, ISO Procedures, Reliability Rules and all other applicable reliability rules, standards and criteria on a twenty-four (24) hour basis, a suitable local control center(s) with all equipment and facilities reasonably required for the ISO to exercise ISO Operational Control over NTO Transmission Facilities Under ISO Operational Control, and for the NTO to fulfill its responsibilities under this Agreement. Operation of the NYS Power System is a cooperative effort coordinated by the ISO control center in conjunction with local control centers and will require the exchange of all reasonably necessary information. The NTO shall provide the ISO with Supervisory Control and Data Acquisition (“SCADA”) information on facilities listed in Appendices A-1 and A-2 herein as well as on generation and merchant transmission resources interconnected to the NTO’s transmission facilities pursuant to the ISO OATT. The NTO shall provide metering data for its transmission facilities to the ISO, unless other parties are authorized by the appropriate regulatory authority to provide metering data. The NTO shall collect and submit to the ISO billing quality metering data and any other information for its transmission facilities required by the ISO for billing purposes. The NTO shall provide to the ISO the telemetry and other operating data from generation and merchant transmission resources interconnected to its transmission facilities that the ISO requires for the operation of the NYS Power System. The NTO will establish and maintain a strict code of conduct to prevent such information from reaching any unauthorized person or entity.

  • Data Transfer 11.1 The Processor may not transfer or authorize the transfer of Data to countries outside the EU and/or the European Economic Area (EEA) without the prior written consent of the Company. If personal data processed under this Agreement is transferred from a country within the European Economic Area to a country outside the European Economic Area, the Parties shall ensure that the personal data are adequately protected. To achieve this, the Parties shall, unless agreed otherwise, rely on EU approved standard contractual clauses for the transfer of personal data.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • PROMOTION AND TRANSFER 9:1 Employees may file requests, in writing, for promotion to the Working Xxxxxxx classification or for a Employees may file requests, in writing, for promotion to the Working Xxxxxxx classification or for a transfer to a new location in their present classification with the Office of the Company. Whenever a vacancy occurs, the Company will, before filling such vacancy, first give consideration to such requests and the following factors being sufficient give preference on the basis of seniority.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.