We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.
For more information visit our privacy policy.Core Services The Company agrees to provide to the Municipality the Core Services set forth in Schedule “A”. The Company and the Municipality may amend Schedule “A” from time to time upon mutual agreement.
Software Services If elected by Customer, the following Software Services will be made available for Customer’s use. 2.1. Core HR Software Service is a system of interactive web pages to assist Customer in its human resource related recordkeeping and reporting. Customer shall ensure the accuracy of its Customer Data. The HR Software Services shall function in accordance with the Documentation, as may be amended from time to time, and provide features to aid Customer with its compliance with federal and state laws and regulations applicable to Human Resources (except as stated otherwise in the Documentation). 2.2. Recruiting Software Service is a system of interactive web pages to assist Customer in posting job requisitions, storing candidates, recording job applications, and the related recordkeeping and reporting. Customer shall ensure the accuracy of its Customer Data. The Recruiting Software Service shall function in accordance with the Documentation which may be amended from time to time.
Vision Care Services For purposes of coordination of benefits, vision care services covered under other plans are not considered an allowable expense, as defined in the Coordination of Benefits and Subrogation in Section 7.
COVERED HEALTHCARE SERVICES This section describes covered healthcare services. This plan covers services only if they meet all of the following requirements: • Listed as a covered healthcare service in this section. The fact that a provider has prescribed or recommended a service, or that it is the only available treatment for an illness or injury does not mean it is a covered healthcare service under this plan. • Medically necessary, consistent with our medical policies and related guidelines at the time the services are provided. • Not listed in Exclusions Section. • Received while a member is enrolled in the plan. • Consistent with applicable state or federal law. We review medical necessity in accordance with our medical policies and related guidelines. Our medical policies can be found on our website. Our medical policies are written to help administer benefits for the purpose of claims payment. They are made available to you for informational purposes and are subject to change. Medical policies are not meant to be used as a guide for your medical treatment. Your medical treatment remains a decision made by you with your physician. If you have questions about our medical policies, please call Customer Service. When a new service or drug becomes available, when possible, we will review it within six (6) months of one of the events described below to determine whether the new service or drug will be covered: • the assignment of an American Medical Association (AMA) Current Procedural Terminology (CPT) code in the annual CPT publication; • final Food and Drug Administration (FDA) approval; • the assignment of processing codes other than CPT codes or approval by governing or regulatory bodies other than the FDA; • submission to us of a claim meeting the criteria above; and • generally, the first date an FDA approved prescription drug is available in pharmacies (for prescription drug coverage only). During the review period, new services and drugs are not covered. For all covered healthcare services, please see the Summary of Medical Benefits and the Summary of Pharmacy Benefits to determine the amount that you pay and any benefit limits.
Supportive Services 2.1. Case Management Access Shelter Providers are required to have case management available to participants on site. Participation within case management is voluntary to program participants, however all participants must be offered case management and must be engaged on an ongoing basis to encourage participation. Shelter Providers should recognize that it may take multiple contacts before a participant is ready to engage. Shelter Providers must ensure case management services are participant-centered to individual needs. Programs must provide space for the provision of case management that works to create as much privacy and confidentiality as possible.
SaaS Services 6.1 Our SaaS Services are audited at least yearly in accordance with the AICPA’s Statement on Standards for Attestation Engagements (“SSAE”) No. 18. We have attained, and will maintain, SOC 1 and SOC 2 compliance, or its equivalent, for so long as you are timely paying for SaaS Services. Upon execution of a mutually agreeable Non-Disclosure Agreement (“NDA”), we will provide you with a summary of our compliance report(s) or its equivalent. Every year thereafter, for so long as the NDA is in effect and in which you make a written request, we will provide that same information. 6.2 You will be hosted on shared hardware in a Tyler data center or in a third-party data center. In either event, databases containing your Data will be dedicated to you and inaccessible to our other customers. 6.3 Our Tyler data centers have fully-redundant telecommunications access, electrical power, and the required hardware to provide access to the Tyler Software in the event of a disaster or component failure. In the event any of your Data has been lost or damaged due to an act or omission of Tyler or its subcontractors or due to a defect in Tyler’s software, we will use best commercial efforts to restore all the Data on servers in accordance with the architectural design’s capabilities and with the goal of minimizing any Data loss as greatly as possible. In no case shall the recovery point objective (“RPO”) exceed a maximum of twenty-four (24) hours from declaration of disaster. For purposes of this subsection, RPO represents the maximum tolerable period during which your Data may be lost, measured in relation to a disaster we declare, said declaration will not be unreasonably withheld. 6.4 In the event we declare a disaster, our Recovery Time Objective (“RTO”) is twenty-four (24) hours. For purposes of this subsection, RTO represents the amount of time, after we declare a disaster, within which your access to the Tyler Software must be restored. 6.5 We conduct annual penetration testing of either the production network and/or web application to be performed. We will maintain industry standard intrusion detection and prevention systems to monitor malicious activity in the network and to log and block any such activity. We will provide you with a written or electronic record of the actions taken by us in the event that any unauthorized access to your database(s) is detected as a result of our security protocols. We will undertake an additional security audit, on terms and timing to be mutually agreed to by the parties, at your written request. You may not attempt to bypass or subvert security restrictions in the SaaS Services or environments related to the Tyler Software. Unauthorized attempts to access files, passwords or other confidential information, and unauthorized vulnerability and penetration test scanning of our network and systems (hosted or otherwise) is prohibited without the prior written approval of our IT Security Officer. 6.6 We test our disaster recovery plan on an annual basis. Our standard test is not client-specific. Should you request a client-specific disaster recovery test, we will work with you to schedule and execute such a test on a mutually agreeable schedule. At your written request, we will provide test results to you within a commercially reasonable timeframe after receipt of the request. 6.7 We will be responsible for importing back-up and verifying that you can log-in. You will be responsible for running reports and testing critical processes to verify the returned Data. 6.8 We provide secure Data transmission paths between each of your workstations and our servers. 6.9 Tyler data centers are accessible only by authorized personnel with a unique key entry. All other visitors to Tyler data centers must be signed in and accompanied by authorized personnel. Entry attempts to the data center are regularly audited by internal staff and external auditors to ensure no unauthorized access. 6.10 Where applicable with respect to our applications that take or process card payment data, we are responsible for the security of cardholder data that we possess, including functions relating to storing, processing, and transmitting of the cardholder data and affirm that, as of the Effective Date, we comply with applicable requirements to be considered PCI DSS compliant and have performed the necessary steps to validate compliance with the PCI DSS. We agree to supply the current status of our PCI DSS compliance program in the form of an official Attestation of Compliance, which can be found at xxxxx://xxx.xxxxxxxxx.xxx/about- us/compliance, and in the event of any change in our status, will comply with applicable notice requirements.
Hospice Services Services are available for a Member whose Attending Physician has determined the Member's illness will result in a remaining life span of six months or less.
Preventive Services All necessary procedures to prevent the occurrence of oral disease, including: Cleaning and scaling Topical application of fluoride Space maintainers
Acquisition Services (i) Serve as the Company’s investment and financial advisor and provide relevant market research and economic and statistical data in connection with the Company’s assets and investment objectives and policies; (ii) Subject to Section 4 hereof and the investment objectives and policies of the Company: (a) locate, analyze and select potential investments; (b) structure and negotiate the terms and conditions of transactions pursuant to which investments in Properties, Loans and other Permitted Investments will be made; (c) acquire, originate and dispose of Properties, Loans and other Permitted Investments on behalf of the Company; (d) arrange for financing and refinancing and make other changes in the asset or capital structure of investments in Properties, Loans and other Permitted Investments; and (e) enter into leases, service contracts and other agreements for Properties, Loans and other Permitted Investments; (iii) Perform due diligence on prospective investments and create due diligence reports summarizing the results of such work; (iv) Prepare reports regarding prospective investments that include recommendations and supporting documentation necessary for the Directors to evaluate the proposed investments; (v) Obtain reports (which may be prepared by the Advisor or its Affiliates), where appropriate, concerning the value of contemplated investments of the Company; (vi) Deliver to or maintain on behalf of the Company copies of all appraisals obtained in connection with the Company’s investments; and (vii) Negotiate and execute approved investments and other transactions, including prepayments, maturities, workouts and other settlements of Loans and other Permitted Investments.
Hosting Services NCR Voyix shall furnish facilities, equipment, computer programs and services, as specified from time to time by NCR Voyix, that NCR Voyix deems necessary for operation and maintenance of the System (collectively, the “Hosting Services”).