Substance Use Disorder Programming Sample Clauses

Substance Use Disorder Programming. (SUD). Provider agrees to: Provider will provide SUD treatment Services to as many Inmates as possible and maximize the efficient use of treatment beds. In conjunction with DDOC’s ability to make appropriate referrals and move program participants to the designated programs, Provider shall assist the DDOC with keeping the treatment beds filled with clinically appropriate Inmates as determined through classification and assessment. Provider is aware that a Cognitive Community model combines two evidence-based programming approaches: therapeutic community (“TC”) and cognitive behavioral therapy (“CBT”) and will ensure both models maintain fidelity. Provider will maintain the DDOC’s use of the eight principles of evidence based practices as the theoretical foundation for providing and assessing SUD programming, including residential SUD programs. In brief, these eight principles include the following: • Use of actuarial risk/needs assessments • Get patients treatment ready • Target interventions with laser-like focus • Skill train with directed practice • Increase positive reinforcement • Engage ongoing support in natural communities • Measure relevant processes and practices • Provide measurement feedback R-SUD program patients should participate in 35 to 50 hours of structured activity per week, based on the current CPC (University of Cincinnati Corrections Institute-Corrections Program Checklist) requirements. Provider must provide SUD staffing that is flexible and available seven days a week. Provider will provide comprehensive residential SUD program services on weekdays, evenings, and weekends. Provider shall support and assist the DDOC’s residential SUD program redesign plan that incorporates TC and CBT evidence- based interventions. This name Cognitive Community captures the importance of maintaining social learning through a therapeutic community milieu, while providing structured skill teaching through evidence-based programming centered on cognitive restructuring interventions. To facilitate a smooth contract transition, Provider is prepared to continue using the corrections-specific manualized CBT materials currently in place for ASAM Level 3 residential SUD program services. The core curriculum is comprised of the following evidence-based cognitive behavioral interventions: CBI-CC – Cognitive Behavioral Interventions for Offenders – A Comprehensive Curriculum, published by the University of Cincinnati Supplemented by: • CBI-SA – Cognitive Behavio...
AutoNDA by SimpleDocs

Related to Substance Use Disorder Programming

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Substance Use Disorder counseling shall be provided by a QCC, or Chemical Dependency Counselor Intern. Substance use disorder education and life skills training shall be provided by counselors or individuals who have been trained in the education. All counselor interns shall work under the direct supervision of a QCC.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

Time is Money Join Law Insider Premium to draft better contracts faster.