Protocols Review Sample Clauses

Protocols Review. If (i) Takeda desires to conduct a Takeda Study as permitted under Article 4, or any Development activity assumed by Takeda under Section 4.4, or (ii) AMAG desires to conduct an Other AMAG Study as permitted under Article 4, or Phase 4 Clinical Trials in the Licensed Territory for the purpose of obtaining Regulatory Approval for or Commercializing the Product outside the Licensed Territory, then in each case (i) and (ii) such Party shall notify the JDC at the first JDC meeting following such Party’s decision to conduct any such activities. With respect to any proposed clinical trial, the proposing Party shall provide to the JDC, as soon as available (if not available prior to such meeting), the protocol, primary and secondary endpoints, inclusion and exclusion criteria, comparators, estimated number of patients, and statistical power for such trial, and the countries in which such trial will be conducted, as well and any other material matters pertaining to such study.
AutoNDA by SimpleDocs
Protocols Review. In general, the key establishment protocols can be classi ed into two types: key distribution protocols and key agreement protocols [5]. The key distribution protocols, sometimes called as centralized key distribution protocols, are generally based on a trusted third party (TTP). The key agreement protocols, on the other hand, do not use a TTP but rely on the group members for a general key agreement. The centralized method has the following disadvantages: (1) The TTP that generates A. Two-party Key Agreement The following notation is used throughout the paper: q order of an algebraic group G crete log-arithmetic and the DiÆe-Xxxxxxx Decision problem. This classic DiÆe-Xxxxxxx protocol is vulnerable to the so called man-in-the-middle attack. Several remedy protocols were pro- posed. See [10] for a more detailed discussion.

Related to Protocols Review

  • Log Reviews All systems processing and/or storing PHI COUNTY discloses to 11 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 12 must have a routine procedure in place to review system logs for unauthorized access.

  • Program Review The State ECEAP Office will conduct a review of each contractor’s compliance with the ECEAP Contract and ECEAP Performance Standards every four years. The review will involve ECEAP staff and parents. After the Program Review, the State ECEAP Office will provide the contractor with a Program Review report. The contractor must submit an ECEAP Corrective Action Plan for non-compliance with ECEAP Performance Standards. The Plan must be approved by the State ECEAP Office.

  • Project Review A. Programmatic Allowances 1. If FEMA determines that the entire scope of an Undertaking conforms to one or more allowances in Appendix B of this Agreement, with determinations for Tier II Allowances being made by SOI-qualified staff, FEMA shall complete the Section 106 review process by documenting this determination in the project file, without SHPO review or notification. 2. If the Undertaking involves a National Historic Landmark (NHL), FEMA shall notify the SHPO, participating Tribe(s), and the NPS NHL Program Manager of the NPS Midwest Regional Office that the Undertaking conforms to one or more allowances. FEMA shall provide information about the proposed scope of work for the Undertaking and the allowance(s) enabling FEMA’s determination. 3. If FEMA determines any portion of an Undertaking’s scope of work does not conform to one or more allowances listed in Appendix B, FEMA shall conduct expedited or standard Section 106 review, as appropriate, for the entire Undertaking in accordance with Stipulation II.B, Expedited Review for Emergency Undertakings, or Stipulation II.C, Standard Project Review. 4. Allowances may be revised and new allowances may be added to this Agreement in accordance with Stipulation IV.A.3, Amendments. B. Expedited Review for Emergency Undertakings

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • BUSINESS REVIEWS Supplier must perform a minimum of one business review with Sourcewell per contract year. The business review will cover sales to Participating Entities, pricing and contract terms, administrative fees, sales data reports, performance issues, supply issues, customer issues, and any other necessary information.

  • Utilization Review NOTE: The Utilization Review process does not apply to Services that are not covered by Blue Shield because of a coverage determination made by Medicare. State law requires that health plans disclose to Subscribers and health plan providers the process used to authorize or deny health care services un- der the plan. Blue Shield has completed documen- tation of this process ("Utilization Review"), as required under Section 1363.5 of the California Health and Safety Code. To request a copy of the document describing this Utilization Review pro- cess, call the Customer Service Department at the telephone number indicated on your Identification Card.

  • AUDIT REVIEW PROCEDURES Any dispute concerning a question of fact arising under an interim or post audit of this AGREEMENT that is not disposed of by agreement, shall be reviewed by ALAMEDA CTC’s Deputy Executive Director of Finance and Administration. Not later than thirty (30) calendar days after issuance of the final audit report, CONSULTANT may request a review by ALAMEDA CTC’s Deputy Executive Director of Finance and Administration of unresolved audit issues. The request for review will be submitted in writing. Neither the pendency of a dispute nor its consideration by ALAMEDA CTC will excuse CONSULTANT from full and timely performance, in accordance with the terms of this AGREEMENT. CONSULTANT and subconsultants’ contracts, including cost proposals and ICRs, may be subject to audits or reviews such as, but not limited to, an AGREEMENT Audit, an Incurred Cost Audit, an ICR Audit, or a certified public accountant (“CPA”) ICR Audit Workpaper Review. If selected for audit or review, the AGREEMENT, cost proposal and ICR and related workpapers, if applicable, will be reviewed to verify compliance with 48 CFR, Chapter 1, Part 31 and other related laws and regulations. In the instances of a CPA ICR Audit Workpaper Review it is CONSULTANT’s responsibility to ensure federal, state, or local government officials are allowed full access to the CPA’s workpapers including making copies as necessary. The AGREEMENT, cost proposal, and ICR shall be adjusted by CONSULTANT and approved by ALAMEDA CTC to conform to the audit or review recommendations. CONSULTANT agrees that individual terms of costs identified in the audit report shall be incorporated into the contract by this reference if directed by ALAMEDA CTC at its sole discretion. Refusal by CONSULTANT to incorporate audit or review recommendations, or to ensure that the federal, state, or local governments have access to CPA workpapers, will be considered a breach of contract terms and cause for termination of the AGREEMENT and disallowance of prior reimbursed costs.

  • Review Protocol A narrative description of how the Claims Review was conducted and what was evaluated.

  • Business Review Meetings In order to maintain the relationship between the Department and the Contractor, each quarter the Department may request a business review meeting. The business review meeting may include, but is not limited to, the following: • Successful completion of deliverables • Review of the Contractor’s performance • Review of minimum required reports • Addressing of any elevated Customer issues • Review of continuous improvement ideas that may help lower total costs and improve business efficiencies.

  • Independent Review Contractor shall provide the Secretary of ADS/CIO an independent expert review of any Agency recommendation for any information technology activity when its total cost is $1,000,000.00 or greater or when CIO requires one. The State has identified two sub-categories for Independent Reviews, Standard and Complex. The State will identify in the SOW RFP the sub-category they are seeking. State shall not consider bids greater than the maximum value indicated below for this category. Standard Independent Review $25,000 Maximum Complex Independent Review $50,000 Maximum Per Vermont statute 3 V.S.A. 2222, The Secretary of Administration shall obtain independent expert review of any recommendation for any information technology initiated after July 1, 1996, as information technology activity is defined by subdivision (a) (10), when its total cost is $1,000,000 or greater or when required by the State Chief Information Officer. Documentation of this independent review shall be included when plans are submitted for review pursuant to subdivisions (a)(9) and (10) of this section. The independent review shall include: • An acquisition cost assessment • A technology architecture review • An implementation plan assessment • A cost analysis and model for benefit analysis • A procurement negotiation advisory services contract • An impact analysis on net operating costs for the agency carrying out the activity In addition, from time to time special reviews of the advisability and feasibility of certain types of IT strategies may be required. Following are Requirements and Capabilities for this Service: • Identify acquisition and lifecycle costs; • Assess wide area network (WAN) and/or local area network (LAN) impact; • Assess risks and/or review technical risk assessments of an IT project including security, data classification(s), subsystem designs, architectures, and computer systems in terms of their impact on costs, benefits, schedule and technical performance; • Assess, evaluate and critically review implementation plans, e.g.: • Adequacy of support for conversion and implementation activities • Adequacy of department and partner staff to provide Project Management • Adequacy of planned testing procedures • Acceptance/readiness of staff • Schedule soundness • Adequacy of training pre and post project • Assess proposed technical architecture to validate conformance to the State’s “strategic direction.” • Insure system use toolsets and strategies are consistent with State Chief Information Officer (CIO) policies, including security and digital records management; • Assess the architecture of the proposed hardware and software with regard to security and systems integration with other applications within the Department, and within the Agency, and existing or planned Enterprise Applications; • Perform cost and schedule risk assessments to support various alternatives to meet mission need, recommend alternative courses of action when one or more interdependent segment(s) or phase(s) experience a delay, and recommend opportunities for new technology insertions; • Assess the architecture of the proposed hardware and software with regard to the state of the art in this technology. • Assess a project’s backup/recovery strategy and the project’s disaster recovery plans for adequacy and conformance to State policy. • Evaluate the ability of a proposed solution to meet the needs for which the solution has been proposed, define the ability of the operational and user staff to integrate this solution into their work.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!