Compliance with ILS Community Network and Managed Care Plan Policies and Procedures Sample Clauses

Compliance with ILS Community Network and Managed Care Plan Policies and Procedures. Provider shall comply with all policies and procedures of ILS Community Network and Managed Care Plans including, without limitation, written standards for the following: (a) timeliness of access to care and Enrollee services; (b) policies and procedures that allow for individual medical necessity determinations (e.g., coverage rules, practice guidelines, payment policies); (c) Provider consideration of Enrollee input into Provider's proposed treatment plan; and (d) Managed Care Plan's accreditation standards; and (e) Managed Care Plan's compliance program which encourages effective communication between Provider and Managed Care Plan's Compliance Officer and participation by Provider in education and training programs regarding the prevention, correction and detection of fraud, waste and abuse and other initiatives identified by CMS. The aforementioned policies and procedures are identified in ILS Community Network and Managed Care Plan Provider Handbook and related Bulletins which are incorporated herein by reference and may be amended from time to time by ILS Community Network or Managed Care Plan. [42 C.F.R. § 422.112; 422.504(i)(4)(v); 42 C.F.R. § 422.202(b); 42 C.F.R. § 422.504(a)(5); 42 C.F.R. § 422.503(b)(4)(vi)(C) & (D) & (G)(3).]
AutoNDA by SimpleDocs

Related to Compliance with ILS Community Network and Managed Care Plan Policies and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Compliance with Consensus Policies and Temporary Policies Registry Operator shall comply with and implement all Consensus Policies and Temporary Policies found at <xxxx://xxx.xxxxx.xxx/general/consensus-­‐policies.htm>, as of the Effective Date and as may in the future be developed and adopted in accordance with the ICANN Bylaws, provided such future Consensus Polices and Temporary Policies are adopted in accordance with the procedure and relate to those topics and subject to those limitations set forth in Specification 1 attached hereto (“Specification 1”).

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Human and Financial Resources to Implement Safeguards Requirements 6. The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • Standards for Network Elements 1.8.1 BellSouth shall comply with the requirements set forth in the technical references, as well as any performance or other requirements identified in this Agreement, to the extent that they are consistent with the greater of BellSouth’s actual performance or applicable industry standards.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Compliance with Texas Privacy Laws and Regulations In performing their respective obligations under the Agreement, the LEA and the Provider shall comply with all Texas laws and regulations pertaining to LEA data privacy and confidentiality, including but not limited to the Texas Education Code Chapter 32, and Texas Government Code Chapter 560.

Time is Money Join Law Insider Premium to draft better contracts faster.