Alternative B. Each Participant shall adopt and implement a protocol for the selection and identification of that Participant’s Authorized Users, and for those Authorized Users’ use of the System and the Services, a copy of which protocol shall be provided to HIO upon request. Such protocol shall comply with the requirements therefor set forth in the Policies and Procedures, and shall describe, without limitation, the process by which the Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services and to verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services. Each Participant shall comply with such protocol in all material respects.39
Appears in 3 contracts
Samples: www.chhs.ca.gov, www.chhs.ca.gov, chhs-data-prod.s3-us-west-2.amazonaws.com
Alternative B. Each Participant shall adopt and implement a protocol for the selection and identification of that Participant’s Authorized Users, and for those Authorized Users’ use of the System and the Services, a copy of which protocol shall be provided to HIO upon request. Such protocol shall comply with the requirements therefor set forth in the Policies and Procedures, and shall describe, without limitation, the process by which the Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services and to verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services. Each Participant shall comply with such protocol in all material respects.39respects.42
Appears in 2 contracts
Samples: Business Associate Agreement, Business Associate Agreement