Xxxxx Access to OCSE’s NDNH Online Database Sample Clauses

Xxxxx Access to OCSE’s NDNH Online Database. In 2001, SSA and OCSE entered into a formal agreement that allows authorized SSA employees query-only access to OCSE’s NDNH database. The NDNH contains quarterly wage data, information on newly hired individuals, and unemployment compensation data. Initially, SSA’s use of the online query access was limited to the processing of Title XVI SSI pre-effectuation review claims, Title XVI initial claims with large underpayments, and any Title XVI case at the claims representative’s discretion. In April 2004, SSA and OCSE expanded the interagency agreement to permit authorized SSA employees to use the NDNH online query to develop work activity when processing Title II DI Continuing Disability Reviews (CDRs), Ticket-to-Work initiative cases, and to resolve earnings discrepancies. The 2015 CMA combined the data exchange matching components of previous matching programs between OCSE and SSA. Since OCSE is required to provide SSA with information from the NDNH, information exchanges have been ongoing for a number of years using two separate technologies; computer match and query interrogation. While the purposes of the disclosure are the same, to support SSA in the administration of programs under the Social Security Act, the technologies that support the operations are different. Consequently, there was an agreement for each technology. The previous CMA was technology neutral and replaced the prior agreements. The current CMA remains technology neutral.
AutoNDA by SimpleDocs

Related to Xxxxx Access to OCSE’s NDNH Online Database

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • ACCESS TO OPERATIONS SUPPORT SYSTEMS 2.1 BellSouth shall provide Max-Tel access to operations support systems (“OSS”) functions for pre-ordering, ordering and provisioning, maintenance and repair, and billing. BellSouth shall provide access to the OSS through manual and/or electronic interfaces as described in this Attachment. It is the sole responsibility of Max-Tel to obtain the technical capability to access and utilize BellSouth’s OSS interfaces. Specifications for Max-Tel ’s access and use of BellSouth’s electronic Version R4Q01: 12/01/01 interfaces are set forth at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx and are incorporated herein by reference.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

Time is Money Join Law Insider Premium to draft better contracts faster.