Substance Use Disorder Programming Sample Clauses

Substance Use Disorder Programming. (SUD). Provider agrees to: Provider will provide SUD treatment Services to as many Inmates as possible and maximize the efficient use of treatment beds. In conjunction with DDOC’s ability to make appropriate referrals and move program participants to the designated programs, Provider shall assist the DDOC with keeping the treatment beds filled with clinically appropriate Inmates as determined through classification and assessment. Provider is aware that a Cognitive Community model combines two evidence-based programming approaches: therapeutic community (“TC”) and cognitive behavioral therapy (“CBT”) and will ensure both models maintain fidelity. Provider will maintain the DDOC’s use of the eight principles of evidence based practices as the theoretical foundation for providing and assessing SUD programming, including residential SUD programs. In brief, these eight principles include the following:  Use of actuarial risk/needs assessments  Get patients treatment ready  Target interventions with laser-like focus  Skill train with directed practice  Increase positive reinforcement  Engage ongoing support in natural communities  Measure relevant processes and practices  Provide measurement feedback R-SUD program patients should participate in 35 to 50 hours of structured activity per week, based on the current CPC (University of Cincinnati Corrections Institute-Corrections Program Checklist) requirements. Provider must provide SUD staffing that is flexible and available seven days a week. Provider will provide comprehensive residential SUD program services on weekdays, evenings, and weekends. Provider shall support and assist the DDOC’s residential SUD program redesign plan that incorporates TC and CBT evidence- based interventions. This name Cognitive Community captures the importance of maintaining social learning through a therapeutic community milieu, while providing structured skill teaching through evidence-based programming centered on cognitive restructuring interventions. To facilitate a smooth contract transition, Provider is prepared to continue using the corrections-specific manualized CBT materials currently in place for ASAM Level 3 residential SUD program services. The core curriculum is comprised of the following evidence-based cognitive behavioral interventions: CBI-CC – Cognitive Behavioral Interventions for Offenders – A Comprehensive Curriculum, published by the University of Cincinnati Supplemented by:  CBI-SA – Cognitive Behavio...
AutoNDA by SimpleDocs

Related to Substance Use Disorder Programming

  • Behavioral Health Services – Mental Health and Substance Use Disorder Inpatient - Unlimited days at a general hospital or a specialty hospital including detoxification or residential/rehabilitation per plan year. Preauthorization may be required for services received from a non-network provider. 0% - After deductible 40% - After deductible Outpatient or intermediate careservices* - See Covered Healthcare Services: Behavioral Health Section for details about partial hospital program, intensive outpatient program, adult intensive services, and child and family intensive treatment. Preauthorization may be required for services received from a non-network provider. 0% - After deductible 40% - After deductible Office visits - See Office Visits section below for Behavioral Health services provided by a PCP or specialist. Psychological Testing 0% - After deductible 40% - After deductible Medication-assisted treatment - whenrenderedby a mental health or substance use disorder provider. 0% - After deductible 40% - After deductible Methadone maintenance treatment - one copayment per seven-day period of treatment. 0% - After deductible 40% - After deductible Outpatient - Benefit is limited to 18 weeks or 36 visits (whichever occurs first) per coveredepisode. 0% - After deductible 40% - After deductible In a physician's office - limited to 12 visits per plan year. 0% - After deductible 40% - After deductible Emergency room - When services are due to accidental injury to sound natural teeth. 0% - After deductible The level of coverage is the same as network provider. In a physician’s/dentist’s office - When services are due to accidental injury to sound natural teeth. 0% - After deductible 40% - After deductible Services connected to dental care when performed in an outpatient facility * 0% - After deductible 40% - After deductible Inpatient/outpatient/in your home 0% - After deductible 40% - After deductible (*) Preauthorization may be required for this service. Please see Preauthorization in Section 5 for more information. You Pay You Pay Outpatient durable medical equipment* - Must be provided by a licensed medical supply provider. 20% - After deductible 40% - After deductible Outpatient medical supplies* - Must be provided by a licensed medical supply provider. 20% - After deductible 40% - After deductible Outpatient diabetic supplies/equipment purchasedat licensed medical supply provider (other than a pharmacy). See the Summary of Pharmacy Benefits for supplies purchased at a pharmacy. 20% - After deductible 40% - After deductible Outpatient prosthesis* - Must be provided by a licensed medical supply provider. 20% - After deductible 40% - After deductible Enteral formula delivered through a feeding tube. Must be sole source of nutrition. 20% - After deductible 40% - After deductible Enteral formula or food taken orally * 20% - After deductible The level of coverage is the same as network provider. Hair prosthesis (wigs) - The benefit limit is $350 per hair prosthesis (wig) when worn for hair loss suffered as a result of cancer treatment. 20% - After deductible The level of coverage is the same as network provider. Coverage provided for members from birth to 36 months. The provider must be certified as an EIS provider by the Rhode Island Department of Human Services. 0% - After deductible The level of coverage is the same as network provider. Asthma management 0% - After deductible 40% - After deductible Hospital emergency room 0% - After deductible The level of coverage is the same as network provider.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Substance Abuse Program The SFMTA General Manager or designee will manage all aspects of the FTA-mandated Substance Abuse Program. He/she shall have appointing and removal authority over all personnel working for the Substance Abuse Program personnel, and shall be responsible for the supervision of the SAP.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!