Supporting At-Risk Enrollees Requiring Transition Sample Clauses

Supporting At-Risk Enrollees Requiring Transition. Contractor shall have an evaluation and transition plan in place for the Enrollees of the Exchange with existing health coverage including, but not limited to, those members transferring from Major Risk Medical Insurance Program, Pre-Existing Condition Insurance Plan, AIDS Drug Assistance Program, or other individuals under active care for complex conditions and who require therapeutic provider and formulary transitions. It is the intention of the Exchange to work with Contractors and State partners to facilitate early identification of at-risk patients where possible. (a) Identification of in-network providers with appropriate clinical expertise or any alternative therapies including specific drugs when transitioning care; (b) Clear process(es) to communicate Enrollee’s continued treatment using a specific therapy, specific drug or a specific provider when no equivalent is available in-network; (c) Where possible, advance notification and understanding of out-of-network provider status for treating and prescribing physicians; and (d) A process to allow incoming Enrollees access to Contractor’s formulary information prior to enrollment. It is not the intention of the Exchange to require that Contractor's transition plans for At-Risk Enrollees impose any obligations on contractor which are not otherwise required under applicable State Law or by other provisions of this Agreement
AutoNDA by SimpleDocs
Supporting At-Risk Enrollees Requiring Transition. Contractor shall have an evaluation and transition plan in place for the Enrollees of the Exchange with existing health coverage including, but not limited to, those members transferring from Major Risk Medical Insurance Program, Pre-Existing Condition Insurance Plan, AIDS Drug Assistance Program, or other individuals under active care for complex conditions and who require therapeutic provider and formulary transitions. It is the intention of the Exchange to work with Contractors and State partners to facilitate early identification of at-risk patients where possible. (a) Identification of in-network providers with appropriate clinical expertise or any alternative therapies including specific drugs when transitioning care; (b) Clear process(es) to communicate Enrollee’s continued treatment using a specific therapy, specific drug or a specific provider when no equivalent is available in-network; (c) Where possible, advance notification and understanding of out-of-network provider status for treating and prescribing physicians; and (d) A process to allow incoming Enrollees access to Contractor’s formulary information prior to enrollment.
Supporting At-Risk Enrollees Requiring Transition. Contractor shall have an evaluation and transition plan in place for the Enrollees of the Exchange with existing health coverage including, but not limited to, those members transferring from Major Risk Medical Insurance Program, Pre-Existing Condition Insurance Plan, AIDS Drug Assistance Program, or other individuals under active care for complex conditions and who require therapeutic provider and formulary transitions . It is the intention of the Exchange to work with Contractors and State partners to facilitate early identification of at-risk patients where possible. (a) Identification of in-network providers with appropriate clinical expertise or any alternative therapies including specific drugs when transitioning care; (b) Clear process(es) to communicate Enrollee’s continued treatment using a specific therapy, specific drug or a specific provider when no equivalent is available in-network; (c) Where possible, advance notification and understanding of out-of-network provider status for treating and prescribing physicians; and (d) A process to allow incoming Enrollees access to Contractor’s formulary information prior to enrollment. Covered California – Final Health Plan Contract Attachments, May 6,20117, 2013 Attachment 7-13 (a) Methods to identify and target At-Risk Enrollees; (b) Description of Contractor’s predictive analytic capabilities to assist in identifying At Risk Plan Enrollees who would benefit from early, proactive intervention; (c) Communication plan for known At-Risk Enrollees to receive information prior to provider visit; (d) Process to update At-Risk Enrollee medical history in the Contractor maintained Plan Enrollee health profile; (e) Mechanisms to evaluate access within provider network, on an ongoing basis, to ensure that an adequate network is in place to support a proactive intervention and care management program for At-Risk Enrollees; (f) Care and network strategies that focuses on supporting a proactive approach to at-risk Plan Enrollee intervention and care management. Contractor agrees to provide the Exchange with a documented plan and include “tools” and strategies to supplement and/or expand care management and provider network capabilities, including an expansion and/or reconfiguration of specialties or health care professionals to meet clinical needs of At Risk Enrollees. (g) Strategies or “tools” not otherwise described in Section 5.02 may include but are not limited to the following: (i) Enrollment of At-Risk Enroll...
Supporting At-Risk Enrollees Requiring Transition. Contractor shall have an evaluation and transition plan in place for the Enrollees of the Exchange with existing health coverage including, but not limited to, those members transferring from Major Risk Medical Insurance Program, Pre-Existing Condition Insurance Plan, AIDS Drug Assistance Program, or other individuals under active care for complex conditions and who require therapeutic provider and formulary transitions. (a) Identification of In-network providers with appropriate clinical expertise or any alternative therapies including specific drugs when transitioning care; (b) Clear process to communicate Enrollee’s continued treatment using a specific therapy, specific drug or a specific provider when no equivalent is available in- network;
Supporting At-Risk Enrollees Requiring Transition. Contractor shall have an evaluation and transition plan in place for the Enrollees of the Exchange with existing health coverage including, but not limited to, those members transferring from Major Risk Medical Insurance Program, Pre-Existing Condition Insurance Plan, AIDS Drug Assistance Program, or other individuals under active care for complex conditions and who require therapeutic provider and formulary transitions. It is the intention of the Exchange to work with Contractors and State partners to facilitate early identification of at-risk patients where possible. (a) Identification of in-network providers with appropriate clinical expertise or any alternative therapies including specific drugs when transitioning care; (b) Clear process(es) to communicate Enrollee’s continued treatment using a specific therapy, specific drug or a specific provider when no equivalent is available in-network;

Related to Supporting At-Risk Enrollees Requiring Transition

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Loop Testing/Trouble Reporting 2.1.6.1 Telepak Networks will be responsible for testing and isolating troubles on the Loops. Telepak Networks must test and isolate trouble to the BellSouth portion of a designed/non-designed unbundled Loop (e.g., UVL-SL2, UCL-D, UVL-SL1, UCL-ND, etc.) before reporting repair to the UNE Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from BellSouth at the time of the trouble report, Telepak Networks will be required to provide the results of the Telepak Networks test which indicate a problem on the BellSouth provided Loop. 2.1.6.2 Once Telepak Networks has isolated a trouble to the BellSouth provided Loop, and had issued a trouble report to BellSouth on the Loop, BellSouth will take the actions necessary to repair the Loop if a trouble actually exists. BellSouth will repair these Loops in the same time frames that BellSouth repairs similarly situated Loops to its End Users. 2.1.6.3 If Telepak Networks reports a trouble on a non-designed or designed Loop and no trouble actually exists, BellSouth will charge Telepak Networks for any dispatching and testing (both inside and outside the CO) required by BellSouth in order to confirm the Loop’s working status. 2.1.6.4 In the event BellSouth must dispatch to the end-user’s location more than once due to incorrect or incomplete information provided by Telepak Networks (e.g., incomplete address, incorrect contact name/number, etc.), BellSouth will xxxx Xxxxxxx Networks for each additional dispatch required to repair the circuit due to the incorrect/incomplete information provided. BellSouth will assess the applicable Trouble Determination rates from BellSouth’s FCC or state tariffs.

  • Required Confidentiality Claim Form This is a requirement of the TIPS Contract and is non-negotiable. TIPS provides the required TIPS Confidentiality Claim Form in the "Attachments" section of this solicitation. Vendor must execute this form by either signing and waiving any confidentiality claim, or designating portions of Vendor's proposal confidential. If Vendor considers any portion of Vendor's proposal to be confidential and not subject to public disclosure pursuant to Chapter 552 Texas Gov’t Code or other law(s) and orders, Vendor must have identified the claimed confidential materials through proper execution of the Confidentiality Claim Form. If TIPS receives a public information act or similar request, any responsive documentation not deemed confidential by you in this manner will be automatically released. For Vendor documents deemed confidential by you in this manner, TIPS will follow procedures of controlling statute(s) regarding any claim of confidentiality and shall not be liable for any release of information required by law, including Attorney General determination and opinion. Notwithstanding any other Vendor designation of Vendor's proposal as confidential or proprietary, Vendor’s submission of this proposal constitutes Vendor’s agreement that proper execution of the required TIPS Confidentiality Claim Form is the only way to assert any portion of Vendor's proposal as confidential.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • COMMERCIAL REUSE OF SERVICES The member or user herein agrees not to replicate, duplicate, copy, trade, sell, resell nor exploit for any commercial reason any part, use of, or access to 's sites.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!