Behavioral Health Services – Mental Health and Substance Use Disorder Inpatient - Unlimited days at a general hospital or a specialty hospital including detoxification or residential/rehabilitation per plan year. Preauthorization may be required for services received from a non-network provider. 0% - After deductible 40% - After deductible Outpatient or intermediate careservices* - See Covered Healthcare Services: Behavioral Health Section for details about partial hospital program, intensive outpatient program, adult intensive services, and child and family intensive treatment. Preauthorization may be required for services received from a non-network provider. 0% - After deductible 40% - After deductible Office visits - See Office Visits section below for Behavioral Health services provided by a PCP or specialist. Psychological Testing 0% - After deductible 40% - After deductible Medication-assisted treatment - whenrenderedby a mental health or substance use disorder provider. 0% - After deductible 40% - After deductible Methadone maintenance treatment - one copayment per seven-day period of treatment. 0% - After deductible 40% - After deductible Outpatient - Benefit is limited to 18 weeks or 36 visits (whichever occurs first) per coveredepisode. 0% - After deductible 40% - After deductible In a physician's office - limited to 12 visits per plan year. 0% - After deductible 40% - After deductible Emergency room - When services are due to accidental injury to sound natural teeth. 0% - After deductible The level of coverage is the same as network provider. In a physician’s/dentist’s office - When services are due to accidental injury to sound natural teeth. 0% - After deductible 40% - After deductible Services connected to dental care when performed in an outpatient facility * 0% - After deductible 40% - After deductible Inpatient/outpatient/in your home 0% - After deductible 40% - After deductible (*) Preauthorization may be required for this service. Please see Preauthorization in Section 5 for more information. You Pay You Pay Outpatient durable medical equipment* - Must be provided by a licensed medical supply provider. 20% - After deductible 40% - After deductible Outpatient medical supplies* - Must be provided by a licensed medical supply provider. 20% - After deductible 40% - After deductible Outpatient diabetic supplies/equipment purchasedat licensed medical supply provider (other than a pharmacy). See the Summary of Pharmacy Benefits for supplies purchased at a pharmacy. 20% - After deductible 40% - After deductible Outpatient prosthesis* - Must be provided by a licensed medical supply provider. 20% - After deductible 40% - After deductible Enteral formula delivered through a feeding tube. Must be sole source of nutrition. 20% - After deductible 40% - After deductible Enteral formula or food taken orally * 20% - After deductible The level of coverage is the same as network provider. Hair prosthesis (wigs) - The benefit limit is $350 per hair prosthesis (wig) when worn for hair loss suffered as a result of cancer treatment. 20% - After deductible The level of coverage is the same as network provider. Coverage provided for members from birth to 36 months. The provider must be certified as an EIS provider by the Rhode Island Department of Human Services. 0% - After deductible The level of coverage is the same as network provider. Asthma management 0% - After deductible 40% - After deductible Hospital emergency room 0% - After deductible The level of coverage is the same as network provider.
Hepatitis B Vaccine Where the Hospital identifies high risk areas where employees are exposed to Hepatitis B, the Hospital will provide, at no cost to the employees, a Hepatitis B vaccine.
Management of Special and Technical Environment Each certificated support person demonstrates an acceptable level of performance in managing and organizing the special materials, equipment and environment essential to the specialized programs.
Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.
Prescription Drugs and Diabetic Equipment or Supplies Biological products for allergen immunotherapy and vaccinations. • Blood fractions. • Compound prescription drugs that are not made up of at least one legend drug. • Bulk powders and chemicals used in compound prescriptions that are not FDA approved, are not covered unless listed on our formulary. • Prescription drugs prescribed or dispensed outside of our dispensing guidelines. • Prescription drugs ordered or prescribed based solely on online questionnaires, telephonic interviews, surveys, emails, or any other marketing solicitation methods, whether alone or in combination. • Prescription drugs that have not proven effective according to the FDA. • Prescription drugs used for cosmetic purposes. • Prescription drugs purchased from a non-designated pharmacy, if a pharmacy has been designated for you through the Pharmacy Home Assignment program. • Experimental prescription drugs including those placed on notice of opportunity hearing status by the Federal Drug Efficacy Study Implementation (DESI). • Prescription drugs provided to you that are not dispensed by a network pharmacy or covered under your medical plan. • Prescription drugs and diabetic equipment and supplies purchased at a non-network pharmacy unless indicated as covered in the Summary of Pharmacy Benefits. • Prescription drug related medical supplies except for diabetic, regardless of the reason prescribed, the intended use, or medical necessity. Examples include, but are not limited to, alcohol pads, bandages, wraps or pill holders. • Off-label use of prescription drugs except as described in Experimental or Investigational Services in Section 3; • Prescribed weight-loss drugs. • Replacement of prescription drugs resulting from a lost, stolen, broken or destroyed prescription order or refill. • Therapeutic devices and appliances, including hypodermic needles and syringes except when used to administer insulin. • Prescription drugs, therapeutic equivalents, or any other pharmaceuticals used to treat sexual dysfunctions. • Vitamins, unless specifically listed as a covered healthcare service. • A prescription drug refill greater than the refill number authorized by your physician, more than a year from the date of the original prescription, or limited by law. • Long acting opioids and other controlled substances, nicotine replacement therapy, and specialty prescription drugs when purchased from a mail order pharmacy. • Prescription drugs and specialty prescription drugs when the required prescription drug preauthorization is not obtained. • Certain prescription drugs that have an over-the-counter (OTC) equivalent. • Prescriptions filled through an internet pharmacy that is not a verified internet pharmacy practice site certified by the National Association of Boards of Pharmacy. • Illegal drugs, including medical marijuana, which are dispensed in violation of state and/or federal law. • Services of a nurse's aide. • Services of a private duty nurse: o when the primary duties are limited to bathing, feeding, exercising, homemaking, giving oral medications or acting as companion or sitter; o after the caregiver or patient have demonstrated the ability to carry out the plan of care; o provided outside the home. Examples include at school, or in a nursing or assisted living facility; o that are duplication or overlap of services. Examples include when a person is receiving hospice care services or for the same hours of a skilled nursing home care visit; o that are for observation only; and o provided as part-time/intermittent and not continuous care. • Maintenance care when the condition has stabilized including routine ostomy care or tube feeding administration or if the anticipated need is indefinite. • Twenty-four (24) hour private duty nursing care for a person without an available caregiver in the home. • Respite care (e.g., care during a caregiver vacation) or private duty nursing so that the caregiver may attend work or school. • Abdominoplasty. • Brow ptosis surgery. • Cervicoplasty. • Chemical exfoliations, peels, abrasions, dermabrasions, or planing for acne, scarring, wrinkling, sun damage or other benign conditions. • Correction of variations in normal anatomy including augmentation mammoplasty, mastopexy, and correction of congenital breast asymmetry. • Dermabrasion. • Ear piercing or repair of a torn earlobe. • Excision of excess skin or subcutaneous tissue except for panniculectomy. • Genioplasty. • Hair transplants. • Hair removal including electrolysis epilation, unless in relation to gender reassignment services or skin grafting. • Inverted nipple surgery. • Laser treatment for acne and acne scars. • Osteoplasty - facial bone reduction. • Otoplasty. • Procedures to correct visual acuity including but not limited to cornea surgery or lens implants. • Removal of asymptomatic benign skin lesions. • Repeated cauterizations or electrofulguration methods used to remove growths on the skin. • Rhinoplasty.
Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.
Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.
Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.
Completion of Concrete Pours and Emergency Work (a) Except as provided in this sub-clause an Employee shall nor work or be required to work in the rain. (b) Employees shall not be required to start a concrete pour in Inclement Weather. (c) Where a concrete pour has been commenced prior to the commencement of a period of Inclement Weather Employees may be required to complete such concrete pour to a practical stage and for such work shall be paid at the rate of double time calculated to the next hour, and in the case of wet weather shall be provided with adequate wet weather gear. (d) If an Employee’s clothes become wet as a result of working in the rain during a concrete pour the Employee shall, unless the Employee has a change of dry working clothes available, be allowed to go home without loss of pay. (e) The provisions of clauses 32.7(c) and 32.7(d) hereof shall also apply in the case of emergency work where the Employees concerned and their delegates agree that the work is of an emergency nature and can start and/or proceed.
New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.