The Client’s Service Information Sample Clauses

The Client’s Service Information. Contents
AutoNDA by SimpleDocs

Related to The Client’s Service Information

  • Service Information Service Visit Date Mode of service Face-to face, telephone, etc. Responsibility for payment Used to exclude federal govt., WCB, etc. Main and secondary diagnoses ICD10-CA codes Main and other interventions and attributes CCI procedure codes and attributes Type of Anesthetic Identifies the type used for interventions (general, spinal, local, etc.) Provider types NACRS code assigned to provider type (MD, Dentist, RN, etc.) Doctor name and identifier Physician specific information Admit via Ambulance Used if a Client is brought to the service delivery site by ambulance Institution from and institution to Used when a Client is transferred from or to another acute care facility Visit disposition Discharged, admitted, left without being seen, etc. Schedule “D” Appendix 2 Additional Elements Required for Data Management (XXX) Client Identifying Information Province Client‟s Home Province AB, BC, SK, MB, NL, PE, NS, NB, QC, ON, NT, YT, NU, US, OC (Other Country), NR (Unsp. Non-resident) Service Information Facility Code AHS provided code that indicates service being provided. Facility Fee Dollar value of service being provided Alberta Health Physician Fee Billing Code Alberta Health Physician Service Fee code that further defines facility code Regional standard format and submission method remains as is via excel file and email. NOTE: Submission method may be adjusted in accordance with security standards of AHS. Schedule “D” Appendix 3

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Client Information (2) Protected Health Information in any form including without limitation, Electronic Protected Health Information or Unsecured Protected Health Information (herein “PHI”);

  • Processing of Personal Information We treat your personal information confidentially and in accordance with applicable legislation. When you purchase insurance from us, we gather information in connection with enrolment, filing a claim and use of our digital platforms, e.g. civil registration number, telephone number, e-mail address, membership of Sygeforsikringen ”danmark”, industry, employment, marital status and any health information. This information is used to create and administer the insurance policy for use in case of a claim and in the ongoing case processing to ensure the best possible service and as part of sales management, product development, quality assurance, advice and determination of general user behaviour. We retain the gathered information for as long as neces- sary and in accordance with the applicable legislation. You can always contact us if you want to know which personal information we have registered about you. You are entitled to change incorrect information. On our website, xx-xxxxxxx.xx, you can read more about data security and how we handle your personal information. In some cases, we pass personal information about you to the suppliers with whom we cooperate.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Handling of Personal Information The Organiser may use the personal information of individuals from exhibition related parties for any communications necessary for the holding of the Exhibition. In addition, the Organiser may send electronic mails or other advertising materials to exhibition related parties for promoting the Exhibition or other exhibitions to be organised by the Organiser. Exhibition related parties give their consent to the Organiser to provide their personal information to its designated partner company or a trade publication that gathers or features information related to the Exhibition whenever the Organiser deems such a provision necessary. Governing Law and Jurisdiction The Exhibition Rules and Regulations shall be governed by and construed in accordance with the laws of Japan. The Tokyo District Court shall have the exclusive jurisdiction over any dispute arising in connection with the Exhibition Rules and Regulations as the court of the first instance. Xxxx Exhibitions Japan Ltd. 18F Shinjuku-Nomura Bldg., 1-26-2 Nishishinjuku, Shinjuku-ku, Tokyo 000-0000, Japan TEL: +00-0-0000-0000 FAX: +00-0-0000-0000 A division of Xxxx Business Registered in England, Number 678540 AUTHORISED SIGNATURE

Time is Money Join Law Insider Premium to draft better contracts faster.