Provider Services The Contractor’s system shall collect, process, and maintain current and historical data on program providers. This information shall be accessible to all parts of the MCMIS for editing and reporting.
Provider Network The Panel of health service Providers with which the Contractor contracts for the provision of covered services to Members and Out-of-network Providers administering services to Members.
Provider If the Provider is a State Agency, the Provider acknowledges that it is responsible for its own acts and deeds and the acts and deeds of its agents and employees. If the Provider is not a State agency, then the Provider agrees to indemnify and save harmless the State and its officers and employees from all claims and liability due to activities of itself, its agents, or employees, performed under this contract and which are caused by or result from error, omission, or negligent act of the Provider or of any person employed by the Provider. The Provider shall also indemnify and save harmless the State from any and all expense, including, but not limited to, attorney fees which may be incurred by the State in litigation or otherwise resisting said claim or liabilities which may be imposed on the State as a result of such activities by the Provider or its employees. The Provider further agrees to indemnify and save harmless the State from and against all claims, demands, and causes of action of every kind and character brought by any employee of the Provider against the State due to personal injuries and/or death to such employee resulting from any alleged negligent act by either commission or omission on the part of the Provider.
Provider Manual The Provider Manual shall be a comprehensive online reference tool for the Provider and staff regarding, but not limited to, administrative, prior authorization, and referral processes, claims and encounter submission processes, continuity of care requirements, and plan benefits. The Provider Manual shall also address topics such as clinical practice guidelines, availability and access standards, care management programs and Enrollee rights.
Providers Services performed by a provider who has been excluded or debarred from participation in federal programs, such as Medicare and Medicaid. To determine whether a provider has been excluded from a federal program, visit the U.S. Department of Human Services Office of Inspector General website (xxxxx://xxxxxxxxxx.xxx.xxx.xxx/) or the Excluded Parties List System website maintained by the U.S. General Services Administration (xxxxx://xxx.xxx.gov/). • Services provided by facilities, dentists, physicians, surgeons, or other providers who are not legally qualified or licensed, according to relevant sections of Rhode Island Law or other governing bodies, or who have not met our credentialing requirements. • Services provided by a non-network provider, unless listed as covered in the Summary of Medical Benefits. • Services provided by naturopaths, homeopaths, or Christian Science practitioners.
Provider Directory a. The Contractor shall make available in electronic form and, upon request, in paper form, the following information about its network providers:
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.
Customer Data 4.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.
Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.
Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.