Mail Access Sample Clauses

Mail Access. The Board shall allow the Association to use inter-campus and electronic mail. The Association shall reimburse the Board for the costs which may be assessed by the United States Postal Service or other delivery services for Association mailings.
AutoNDA by SimpleDocs
Mail Access. The Patient shall be given The Physician’s e-mail address to which non-urgent communications can be addressed. Such communications shall be dealt with by The Physician or staff member of The Center in a timely manner. The Patient understands and agrees that e- mail and the internet should never be used to access medical care in the event of an emergency, or any situation that The Patient could reasonably expect may develop into an emergency. You agree that is such situations when The Patient cannot speak to The Physician immediately in person or by telephone, that The Patient shall call 911 or go to the nearest emergency medical assistance provider and follow the directions of emergency medical personnel. E-mail is not a secure form of communication.
Mail Access. Tier 2 Members shall be given the Provider's e-mail address to which non-urgent communications can be addressed. Such communications shall be dealt with by the Provider or office staff within 24 hours. No Wait or Minimal Wait Appointments. Reasonable effort shall be made to assure that Patient is seen by the Provider immediately upon arriving for a scheduled office visit or after only a minimal wait. If Provider foresees a wait time, Patient shall be contacted and advised of the projected wait time. Same Day/Next Day Appointments. When Patient calls or e-mails the Provider on a normal office day, every reasonable effort shall be made to schedule an appointment with the Provider on the same day or on the following normal office day. After hours and house call visits are at the discretion of the Provider. Visitors. Family members temporarily visiting a Patient from out of town may receive guest membership for limited medical services. Cost is $80/visit. Specialist Coordination. The Practice shall coordinate with medical specialists to whom Patient is referred to assist Patient in obtaining specialty care. Patient understands that fees paid under this Agreement do not include and do not cover specialists' fees or fees due to any medical professional other than the Practice's Providers. * * * * * * * * * * ATTACHMENT 4 Fee Schedule Prices subject to change without notice. Some items may be covered by or can be billed to your insurance by the laboratory, imaging center, or pharmacy. Let us know if you desire that option. Due to variability of insurance plans we are unable to provide those cost estimates to you. Laboratory Tier 1 Tier 2 B12/Folate 20.00 Included (1 annually) BMP 5.00 Included CBC 7.00 Included CMP 7.00 Included COVID swab* Xxx X0x 7.00 Included Influenza swab Iron panel 7.00 Included (1 annually) Lipid 7.00 Included (2 annually) Pap** 50.00 50.00 Pap w/ HPV** 85.00 85.00 PSA 10.00 Included (1 annually) PT/INR 10.00 Included Strep throat swab 15.00 Included (2 annually) TSH 7.00 Included Urinalysis 7.00 Included STD panel HIV 20.00 20.00 Hepatitis 40.00 40.00 GC/Chlamydia 35.00 35.00 * covered by most health insurance or government grant, billed by laboratory ** covered by most insurance, billed by laboratory Radiology* Tier 1 Tier 2 X-Ray 60.00 1 annually CT 450.00 450.00 Ultrasound 150.00 150.00 MRI 650.00 650.00 Screening mammogram 150.00 150.00 DEXA 90.00 90.00 * cash pay price listed by and payable to imaging center. Procedures Non-Members T...

Related to Mail Access

  • E-Mail Access Patient shall be given the Physician’s e-mail address to which non-urgent communications can be addressed. Such communications shall be dealt with by the Physician or staff member of the Practice in a timely manner. Patient understands and agrees that email and the internet should never be used to access medical care in the event of an emergency, or any situation that Patient could reasonably expect may develop into an emergency. Patient agrees that in such situations, when a Patient cannot speak to Physician immediately in person or by telephone, that Patient shall call 911 or the nearest emergency medical assistance provider, and follow the directions of emergency medical personnel.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

Time is Money Join Law Insider Premium to draft better contracts faster.