San Diego’s HMIS Software Sample Clauses

San Diego’s HMIS Software. ‌ The HMIS provides homeless service providers throughout the Region with a collaborative approach to data collection and client management. The CoC selected Clarity Human Services (“Clarity”) a web-based HMIS software owned by Bitfocus, Inc., (“Bitfocus”) to be the HMIS software of record. It empowers human services providers, agencies, coalitions, and communities to manage real-time client and services data. The RTFH contracts directly with Bitfocus for this software and supports end-users with help desk, ongoing training, and project customization. The RTFH works directly with Participating Agencies to identify needs and requirements for custom reports developed by the RTFH or canned reports made available by Bitfocus. Clarity features: • Combine the ease of the internet and the performance of a powerful database; • Protects client confidentiality by carefully restricting access; • Has robust client and referral tracking, case management, agency and project indexing; • Has an advanced reporting tool to understand and use key data; • Facilitates the secure sharing of data to help providers to effectively and efficiently perform client case management; • Ensures client, project, and agency-level data is available and accessible to all Participating Agencies in accordance with Federal, State, and local data sharing policies; • User-friendly, requiring a minimum learning curve for data entry and generation of reports; • Ensures project and agency-wide reports are easily produced by agencies; and • Ensures providers can record detailed client profiles, assessments, referrals, history, and outcomes.
AutoNDA by SimpleDocs
San Diego’s HMIS Software. The HMIS provides homeless service providers throughout the Region with a collaborative approach to data collection and client management. The CoC selected “ServicePoint,” a web-based HMIS software owned by Mediware Information Systems, to be the HMIS software of record. It empowers human services providers, agencies, coalitions, and communities to manage real-time client and services data. The RTFH contracts directly with Mediware Information Systems for this software and supports end-users with help desk, ongoing training, and project customization including development of project-specific assessments and settings. The RTFH works directly with Participating Agencies to identify needs and requirements for custom reports developed by the RTFH or canned reports made available by Mediware Information Systems. ServicePoint features: • Combine the ease of the internet and the performance of a powerful database; • Protects client confidentiality by carefully restricting access; • Has a robust client and referral tracking, case management, agency and project indexing; • Has an advanced reporting tool to understand and use key data; • Facilitates the secure sharing of data to help providers to effectively and efficiently perform client case management; • Ensures client, project, and agency-level data is available and accessible to all Participating Agencies in accordance with Federal, State, and local data sharing policies; • User-friendly, requiring a minimum learning curve for data entry and generation of reports; • Ensures project and agency-wide reports are easily produced by agencies; and • Ensures providers can record detailed client profiles, assessments, referrals, history, and outcomes. Benefits to Participating Agencies: • Increased ability to prepare statistical and programmatic reports for funders, boards, and other stakeholders; • Saves staff time needed to gather client data; • Formulates statistics and completes funding reports; • Increases ability to track client outcomes and measures the success of services provided; • Increases ability to work collaboratively and to cooperate with other agencies to achieve meaningful results; and • Significantly improves efficiency in delivering and managing services, resulting in tangible cost savings. Benefits to Clients: • Provides a comprehensive view of the client, minimizing data collection; • Provides an ability to comprehensively coordinate client care in real time; and • Provides a single client record ...

Related to San Diego’s HMIS Software

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!