Treatment of Cleft Lip and Cleft Palate Sample Clauses

Treatment of Cleft Lip and Cleft Palate. PIC covers treatment of cleft lip and cleft palate for a covered dependent child if treatment is scheduled or started prior to the covered dependent child reaching age 19. Treatment includes orthodontic treatment, oral surgery and dental services directly related to the cleft. If a covered dependent child is also covered under a dental plan which covers orthodontic services, that dental plan shall be considered primary for the necessary orthodontic services. Oral appliances are subject to the same conditions and limitations as durable medical equipment.
AutoNDA by SimpleDocs

Related to Treatment of Cleft Lip and Cleft Palate

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • Future Treatment of Unallowable Costs Unallowable Costs shall be separately determined and accounted for by Defendants, and Defendants shall not charge such Unallowable Costs directly or indirectly to any contracts with the United States or any State Medicaid program, or seek payment for such Unallowable Costs through any cost report, cost statement, information statement, or payment request submitted by Defendants or any of their subsidiaries or affiliates to the Medicare, Medicaid, TRICARE, or FEHBP Programs.

  • Distribution of UDP and TCP queries DNS probes will send UDP or TCP “DNS test” approximating the distribution of these queries.

  • UTILIZATION OF SMALL BUSINESS CONCERNS Seller agrees to actively seek out and provide the maximum practicable opportunities for small businesses, small disadvantaged businesses, women-owned small businesses, minority business enterprises, historically black colleges and universities and minority institutions, Historically Underutilized Business Zone small business concerns and US Veteran and Service-Disabled Veteran Owned small business concerns to participate in the subcontracts Seller awards to the fullest extent consistent with the efficient performance of this Contract.

  • COVID-19 Employees of Contractor and/or persons working on its behalf, including, but not limited to, subcontractors (collectively, “Contractor Personnel”), while performing services under this Agreement and prior to interacting in person with City employees, contractors, volunteers, or members of the public (collectively, “In-Person Services”) must be fully vaccinated against the novel coronavirus 2019 (“COVID-19”). “Fully vaccinated” means that 14 or more days have passed since Contractor Personnel have received the final dose of a two-dose COVID-19 vaccine series (Moderna or Pfizer-BioNTech) or a single dose of a one-dose COVID-19 vaccine (Xxxxxxx & Xxxxxxx/Xxxxxxx) and all booster doses recommended by the Centers for Disease Control and Prevention. Prior to assigning Contractor Personnel to perform In-Person Services, Contractor shall obtain proof that such Contractor Personnel have been fully vaccinated. Contractor shall retain such proof for the document retention period set forth in this Agreement. Contractor shall grant medical or religious exemptions (“Exemptions”) to Contractor Personnel as required by law. If Contractor wishes to assign Contractor Personnel with Exemptions to perform In- Person Services, Contractor shall require such Contractor Personnel to undergo weekly COVID-19 testing, with the full cost of testing to be borne by Contractor. If Contractor Personnel test positive, they shall not be assigned to perform In-Person Services or, to the extent they have already been performing In-Person Services, shall be immediately removed from those assignments. Furthermore, Contractor shall immediately notify City if Contractor Personnel performing In-Person Services (1) have tested positive for or have been diagnosed with COVID-19, (2) have been informed by a medical professional that they are likely to have COVID-19, or (3) meet the criteria for isolation under applicable government orders.

  • Musculoskeletal Injury Prevention and Control The hospital in consultation with the Joint Health and Safety Committee (JHSC) shall develop, establish and put into effect, musculoskeletal prevention and control measures, procedures, practices and training for the health and safety of employees.

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • National Treatment and Most-favoured-nation Treatment (1) Each Contracting Party shall accord to investments of investors of the other Contracting Party, treatment which shall not be less favourable than that accorded either to investments of its own or investments of investors of any third State. (2) In addition, each Contracting Party shall accord to investors of the other Contracting Party, including in respect of returns on their investments, treatment which shall not be less favourable than that accorded to investors of any third State. (3) The provisions of paragraphs (1) and (2) above shall not be construed so as to oblige one Contracting Party to extend to the investors of the other the benefit of any treatment, preference or privilege resulting from: (a) Any existing or future free trade area, customs unions, monetary union or similar international agreement or other forms of regional cooperation to which one of the Contracting Parties is or may become a party, or (b) Any matter pertaining wholly or mainly to taxation.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Treatment of Fees The fees described in this Section 5 (a) are not compensation for the use, detention, or forbearance of money, (b) are in addition to, and not in lieu of, interest and expenses otherwise described in this Agreement, (c) are payable in accordance with Section 3.1(c), (d) are non-refundable, and (e) to the fullest extent permitted by Law, bear interest, if not paid when due, at the Default Rate.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!