EVIDENCE-BASED AND PROMISING PRACTICES Sample Clauses

EVIDENCE-BASED AND PROMISING PRACTICES. 2.3.1. The Contractor shall implement evidence-based and promising practices as described in this section. 2.3.1.1. Contractors’ implementation of these practices shall demonstrate fidelity to the tested model used for each evidence-based practice, when available, in order to assure the effectiveness of the service provided. 2.3.1.1.1. The Contractor may make adjustments for good cause, such as administering the practice in rural areas or to account for cultural differences. 2.3.1.2. Evidence-based and Promising Practices for Adults 2.3.1.2.1. During the term of the contract, the Contractor shall provide at least six (6) evidence-based or promising practices from the list of Adult Services below or offer its own evidence-based and promising practices in addition to the ones listed below. 2.3.1.2.1.1. Contractor may provide a combination of its own evidence based practices and select from the below list to meet the requirement of six (6) practices chosen. 2.3.1.2.1.2. The Contractor shall design two (2) evidence based practices for the co- occurring mental illness/substance use disorder population and shall measure performance against at least two (2) metrics of each of the selected practices annually.
AutoNDA by SimpleDocs

Related to EVIDENCE-BASED AND PROMISING PRACTICES

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

  • Notice and Procedures If any suit, action, proceeding (including any governmental or regulatory investigation), claim or demand shall be brought or asserted against any person in respect of which indemnification may be sought pursuant to either paragraph (a) or (b) above, such person (the “Indemnified Person”) shall promptly notify the person against whom such indemnification may be sought (the “Indemnifying Person”) in writing; provided that the failure to notify the Indemnifying Person shall not relieve it from any liability that it may have under paragraph (a) or (b) above except to the extent that it has been materially prejudiced (through the forfeiture of substantive rights or defenses) by such failure; and provided, further, that the failure to notify the Indemnifying Person shall not relieve it from any liability that it may have to an Indemnified Person otherwise than under paragraph (a) or (b) above. If any such proceeding shall be brought or asserted against an Indemnified Person and it shall have notified the Indemnifying Person thereof, the Indemnifying Person shall retain counsel reasonably satisfactory to the Indemnified Person (who shall not, without the consent of the Indemnified Person, be counsel to the Indemnifying Person) to represent the Indemnified Person in such proceeding and shall pay the fees and expenses of such counsel related to such proceeding, as incurred. In any such proceeding, any Indemnified Person shall have the right to retain its own counsel, but the fees and expenses of such counsel shall be at the expense of such Indemnified Person unless (i) the Indemnifying Person and the Indemnified Person shall have mutually agreed to the contrary; (ii) the Indemnifying Person has failed within a reasonable time to retain counsel reasonably satisfactory to the Indemnified Person; (iii) the Indemnified Person shall have reasonably concluded that there may be legal defenses available to it that are different from or in addition to those available to the Indemnifying Person; or (iv) the named parties in any such proceeding (including any impleaded parties) include both the Indemnifying Person and the Indemnified Person and representation of both parties by the same counsel would be inappropriate due to actual or potential differing interest between them. It is understood and agreed that the Indemnifying Person shall not, in connection with any proceeding or related proceedings in the same jurisdiction, be liable for the fees and expenses of more than one separate firm (in addition to any local counsel) for all Indemnified Persons, and that all such fees and expenses shall be paid or reimbursed as they are incurred. Any such separate firm for any Underwriter, its affiliates, directors and officers and any control persons of such Underwriter shall be designated in writing by the Representatives and any such separate firm for the Company, its directors, its officers who signed the Registration Statement and any control persons of the Company shall be designated in writing by the Company. The Indemnifying Person shall not be liable for any settlement of any proceeding effected without its written consent, but if settled with such consent or if there be a final judgment for the plaintiff, the Indemnifying Person agrees to indemnify each Indemnified Person from and against any loss or liability by reason of such settlement or judgment. Notwithstanding the foregoing sentence, if at any time an Indemnified Person shall have requested that an Indemnifying Person reimburse the Indemnified Person for fees and expenses of counsel as contemplated by this paragraph, the Indemnifying Person shall be liable for any settlement of any proceeding effected without its written consent if (i) such settlement is entered into more than 30 days after receipt by the Indemnifying Person of such request and (ii) the Indemnifying Person shall not have reimbursed the Indemnified Person in accordance with such request prior to the date of such settlement. No Indemnifying Person shall, without the written consent of the Indemnified Person, effect any settlement of any pending or threatened proceeding in respect of which any Indemnified Person is or could have been a party and indemnification could have been sought hereunder by such Indemnified Person, unless such settlement (x) includes an unconditional release of such Indemnified Person, in form and substance reasonably satisfactory to such Indemnified Person, from all liability on claims that are the subject matter of such proceeding and (y) does not include any statement as to or any admission of fault, culpability or a failure to act by or on behalf of any Indemnified Person.

  • Standard Hazard and Flood Insurance Policies For each Mortgage Loan (other than a Cooperative Loan), the Master Servicer shall maintain, or cause to be maintained by each Servicer, standard fire and casualty insurance and, where applicable, flood insurance, all in accordance with the provisions of this Agreement and the related Servicing Agreement, as applicable. It is understood and agreed that such insurance shall be with insurers meeting the eligibility requirements set forth in the applicable Servicing Agreement and that no earthquake or other additional insurance is to be required of any Mortgagor or to be maintained on property acquired in respect of a defaulted loan, other than pursuant to such applicable laws and regulations as shall at any time be in force and as shall require such additional insurance. Pursuant to Section 4.01, any amounts collected by the Master Servicer, or by any Servicer, under any insurance policies maintained pursuant to this Section 9.16 or any Servicing Agreement (other than amounts to be applied to the restoration or repair of the property subject to the related Mortgage or released to the Mortgagor in accordance with the applicable Servicing Agreement) shall be deposited into the Collection Account, subject to withdrawal pursuant to Section 4.02. Any cost incurred by the Master Servicer or any Servicer in maintaining any such insurance if the Mortgagor defaults in its obligation to do so shall be added to the amount owing under the Mortgage Loan where the terms of the Mortgage Loan so permit; provided, however, that the addition of any such cost shall not be taken into account for purposes of calculating the distributions to be made to Certificateholders and shall be recoverable by the Master Servicer or such Servicer pursuant to Section 4.02.

  • System for Award Management (XXX) Requirement Alongside a signed copy of this Agreement, Grantee will provide Florida Housing with a XXX.xxx proof of registration and Commercial and Government Entity (CAGE) number. Grantee will continue to maintain an active XXX registration with current information at all times during which it has an active award under this Agreement.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Endorsements and Procedures You agree to restrictively endorse any item transmitted through our RDC service by either: • Signing the back of the item with your name and the words “For Mobile Deposit Only” • Following other instructions provided by us. You agree to follow any and all further procedures and instructions for use of our RDC service that we may communicate to you through changes to this agreement or through other notice we provide to you. You agree to securely retain each item for no fewer than 90 days after deposit. Then, no fewer than 90 days after deposit, you agree to mark each item submitted via our RDC service as “Void” and dispose of it using a high degree of care to ensure the item cannot be transmitted, deposited, or presented again. We reserve the right to impose daily limits on the aggregate amount of and/or number of deposits you may make using our RDC service. We may modify these limits at any time and without notice. Current limits are presented to you in our RDC service interface. Your enrollment in our RDC services generally occurs when you become an account owner; however, we reserve the right to deny your enrollment in and terminate your access to RDC service at our sole discretion. You warrant to us that: • You will only transmit eligible items that are properly endorsed. • You will not transmit duplicate items. • All information you provide to us when using our RDC service is accurate and true. • We will not sustain a loss because you have deposited an item. • You will indemnify us from any loss for breach of this warranty provision. In general, if an image of an item you transmit using RDC is received and accepted before 4:00 p.m. ET on a business day we are open, we consider that day to be the day of that deposit, subject to the other terms and conditions herein. Otherwise, we may consider the deposit to be made on the next Business Day we are open. Funds deposited using our RDC service will generally be made available by the third business day from the day of deposit. However, we generally make the first $225 of the aggregate of your checks deposited through our RDC service on each business day available by the next business day. We may delay the availability of your funds for a longer period of time at our discretion if we deem it appropriate in accordance with our policies and procedures.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Policies and Practices The employment relationship between the Parties shall be governed by this Agreement and the policies and practices established by the Company and the Board of Directors (hereinafter referred to as the “Board”). In the event that the terms of this Agreement differ from or are in conflict with the Company’s policies or practices or the Company’s Employee Handbook, this Agreement shall control.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!