Target Population TREATMENT FOR ADULT (TRA) Target Population
Population The Population shall be defined as all Paid Claims during the 12-month period covered by the Claims Review.
Study Population Infants who underwent creation of an enterostomy receiving postoperative care and awaiting enterostomy closure: to be assessed for eligibility: n = 201 to be assigned to the study: n = 106 to be analysed: n = 106 Duration of intervention per patient of the intervention group: 6 weeks between enterostomy creation and enterostomy closure Follow-up per patient: 3 months, 6 months and 12 months post enterostomy closure, following enterostomy closure (12-month follow-up only applicable for patients that are recruited early enough to complete this follow-up within the 48 month of overall study duration).
Eligible Population 5.1 Program eligibility is determined by applicable law set forth in Program rules and the requirements established in the Program Policy Manual. 5.2 The unduplicated number of Clients for PHC services is 430. This represents the Grantee’s projected number of unduplicated Clients to be served during the Contract period. If during the Contract period it is foreseen that the Grantee might be unable to serve the contracted number of children, HHSC may reduce the Grantee’s grant award amount.
Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).