Vignette Sample Clauses

Vignette. 5. Share an effected photo
AutoNDA by SimpleDocs
Vignette. The case study or vignette represents an American with a “typical” symptom profile, yet one sufficiently ambiguous so that there was not only one obvious “correct” diagnosis and treatment plan. In developing the case I analyzed data from the National Comorbidity Survey Replication (NCS-R), a representative national survey that provides the most up-to-date data available on the incidence and prevalence of psychiatric symptoms among Americans (Xxxxxxx and Merikangas 2004). In order to develop the case I selected a subset of individuals from the NCS-R database who qualified for both a non-psychotic mood disorder and an anxiety disorder, disorders that often co-occur in the same individual (Xxxxxxx 2001) and are the two most common types of mental disorders that Americans qualify for based on their symptom profiles (Wang et al. 2005). I generated descriptive statistics for this subset (i.e., symptom frequencies; mean age; modal race/ethnicity; modal gender; modal professional status) in order to develop a picture of the average American suffering from both an anxiety and a mood disorder. The result is “Xxxxxxx,” a 39-year-old white paraprofessional with a history of panic attacks, overwhelming sadness, worry, and difficulty sleeping and concentrating. In order to make the case more realistic I added personal details (e.g., Xxxxxxx is a married mother of two children working as a paralegal who enjoys reading mystery novels) and context (she presents for treatment due to recent panic attacks that occurred while she was driving; Jessica’s marriage is strained) to the case study. Two texts published by the American Psychiatric Association (Xxxxxxx and Xxxx 2001; Xxxxxxx et al. 1994) compile case studies of real patients who have presented to mental health clinicians. The texts are used to train mental health clinicians how to differentially diagnose based on DSM-IV’s (1994) criteria sets. I modeled the format of the case study on cases presented in these two publications, as well as on case studies that appeared in clinical judgment studies such as Xxxxxx and Xxxxxx (1988) and Xxxx and Xxxxx (2004). The one-page case study that I asked trainees to evaluate appears in this chapter as Appendix 3-G.

Related to Vignette

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Software Warranty We warrant that the Tyler Software will perform without Defects during the term of this Agreement. If the Tyler Software does not perform as warranted, we will use all reasonable efforts, consistent with industry standards, to cure the Defect in accordance with the maintenance and support process set forth in Section C(9), below, the SLA and our then current Support Call Process.

  • Limited Software Warranty MyECheck represents, warrants, and covenants that: MyECheck warrants to the original end user (“Customer”), and not to subsequent end users, of the Extreme Networks software product (“Software”) that for ninety (90) days from the date of installation of the Software from MyECheck, the Software shall substantially conform with the specification for the Software at the (“Documentation”). MyECheck does not warrant (i) that the Software is error free, (ii) that Customer will be able to operate the Software without problems or interruptions or (iii) that the Software will be free of vulnerability to intrusion or attack. Except for the limited warranty set forth in this section, the Software is provided “AS IS.”

  • Year 2000 Compatibility Borrower shall take all action necessary to assure that Borrower's computer based systems are able to operate and effectively process data including dates on and after January 1, 2000. At the request of Bank, Borrower shall provide Bank assurance acceptable to Bank of Borrower's Year 2000 compatibility.

  • By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.

  • Ownership of Software and Related Materials All computer programs, written procedures and similar items developed or acquired and used by the Administrator in performing its obligations under this Agreement shall be the property of the Administrator, and no Series will acquire any ownership interest therein or property rights with respect thereto.

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case.

  • Hardware Warranty A. RISK OF LOSS If you purchase any of the hardware Products directly from us, risk of loss or damage to hardware, will pass to you and acceptance will occur upon delivery to your “ship to” address or, if special shipping arrangements are agreed to, upon delivery to your carrier or designee. Title to hardware Products will pass from HPE to you upon full payment for or delivery of the Products, whichever is later. You agree to properly insure the Products for the benefit of HPE between the time risk of loss and damage pass and the time title passes.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

Time is Money Join Law Insider Premium to draft better contracts faster.