Participating Retail Pharmacy Network Access & Management Sample Clauses

Participating Retail Pharmacy Network Access & Management. 4.12.1 The PBM shall be responsible for creating and maintaining a pharmacy network in WellPoint’s Part D Service Areas that is compliant with CMS and Medicare Part D standards. The PBM shall be responsible for developing and maintaining a Pharmacy Network that satisfies CMS and Medicare Part D access standards and contracting requirements. Further, the PBM shall be responsible for contracting with Home Infusion, Long Term Care Pharmacies, Indian Health Service, I/T/U [*] Redacted text. Confidential treatment requested; omitted text filed separately with the Securities and Exchange Commission. 110 and Safety Net Pharmacies consistent with Medicare Part D requirements and CMS instructions. The PBM shall provide WellPoint with a template for each such type of Pharmacy Network agreement and/or amendment for Part D purposes, together with a completed crosswalk of CMS required terms using the form set forth in CMS’ PDP application. Upon reasonable written notice, the PBM shall also make the signature pages for the applicable Pharmacies in the Part D Pharmacy Network available for inspection and copy by WellPoint or CMS.
AutoNDA by SimpleDocs

Related to Participating Retail Pharmacy Network Access & Management

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Support Services HP’s support services will be described in the applicable Supporting Material, which will cover the description of HP’s offering, eligibility requirements, service limitations and Customer responsibilities, as well as the Customer systems supported.

  • Collaboration Management Promptly after the Effective Date, each Party will appoint a person who will oversee day-to-day contact between the Parties for all matters related to the management of the Collaboration Activities in between meetings of the JSC and will have such other responsibilities as the Parties may agree in writing after the Effective Date. One person will be designated by Merck (the “Merck Program Director”) and one person will be designated by Moderna (the “Moderna Program Director,”) together will be the “Program Directors”. Each Party may replace its Program Director at any time by notice in writing to the other Party. Any Program Director may designate a substitute to temporarily perform the functions of that Program Director by written notice to the other Party. The initial Program Directors will be: For Moderna: [***] For Merck: [***]

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • TECHNICAL SUPPORT SERVICES 2.1 The technical support services (the "Services"): Party A agrees to provide to Party B the relevant services requested by Party B, which are specified in Exhibit 1 attached hereto ("Exhibit 1").

  • Maintenance Program LESSEE's Maintenance Program

  • Maintenance and Support Services As long as you are not using the Help Desk as a substitute for our training services on the Tyler Software, and you timely pay your maintenance and support fees, we will, consistent with our then-current Support Call Process:

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Program Managers See Section 14.1.

  • Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition.

Time is Money Join Law Insider Premium to draft better contracts faster.