Critical Access Hospitals Sample Clauses

Critical Access Hospitals. The MCO is encouraged, but not required, to Contract with Critical Access Hospitals (CAH) for inpatient and outpatient hospital services Upon BMS notification to the MCO of any changes to the CAH reimbursement rates, the MCO must update payment rates to CAH effective from the designated CMS effective date. The MCO must pay the new rate for claims not yet paid with a date of service on or after the effective date of change. The new payment rate must be loaded into the MCO’s claims payment system within thirty (30) days of notification of the payment rate change.
AutoNDA by SimpleDocs
Critical Access Hospitals. MCOs contracting with Critical Access Hospitals (CAH) must make payment to CAH at the prevailing Medicaid reimbursement rate. MCO contracts with CAH must stipulate this reimbursement arrangement. Upon BMS notification to the MCO of any changes to the CAH reimbursement rates, the MCO must update payment rates to CAH effective from the designated BMS effective date. The MCO must pay the new rate for claims not yet paid with a date of service on or after the effective date of change.
Critical Access Hospitals. The Contractor shall reimburse Critical Access Hospitals at rates that are at least equal to those established by CMS for Medicare reimbursement to a critical access hospital in accordance with 907 KAR 10:815.

Related to Critical Access Hospitals

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Maintaining Records; Access to Properties and Inspections; Maintenance of Ratings (a) Keep proper books of record and account in which full, true and correct entries in conformity with GAAP and all requirements of law are made of all dealings and transactions in relation to its business and activities. Each Loan Party will, and will cause each of its subsidiaries to, permit any representatives designated by the Administrative Agent or any Lender to visit and inspect the financial records and the properties of such Person at reasonable times and as often as reasonably requested and to make extracts from and copies of such financial records, and permit any representatives designated by the Administrative Agent or any Lender to discuss the affairs, finances and condition of such Person with the officers thereof and independent accountants therefor.

  • Review Systems; Personnel It will maintain business process management and/or other systems necessary to ensure that it can perform each Test and, on execution of this Agreement, will load each Test into these systems. The Asset Representations Reviewer will ensure that these systems allow for each Review Receivable and the related Review Materials to be individually tracked and stored as contemplated by this Agreement. The Asset Representations Reviewer will maintain adequate staff that is properly trained to conduct Reviews as required by this Agreement.

  • Access to Facilities Each of the Company and each of its Subsidiaries will permit any representatives designated by the Purchaser (or any successor of the Purchaser), upon reasonable notice and during normal business hours, at such person's expense and accompanied by a representative of the Company, to:

Time is Money Join Law Insider Premium to draft better contracts faster.