Identification of Authorized Users Sample Clauses

Identification of Authorized Users. To enable HEALTHeLINK to establish appropriate access for each Authorized User, each Participant shall provide HEALTHeLINK with a list in a medium and format approved by HEALTHeLINK identifying all of the Participant’s Authorized Users, together with the information described in Policies and Procedures. Thereafter, the Participant shall provide notification to HEALTHeLINK whenever an Authorized User is added or removed for any reason or when there is a change in an Authorized User’s role requiring notice to HEALTHeLINK under the Policies and Procedures.
AutoNDA by SimpleDocs
Identification of Authorized Users. The Participant shall provide HealtHIE Nevada with a list identifying all that Participant’s Authorized Users, in accordance with the requirements described in the Policies and Procedures. The Participant shall restrict access to the System and, if applicable, use of the Services, only to the Authorized Users that the Participant has so identified to HealtHIE Nevada. The Participant shall inform HealtHIE Nevada in writing within two (2) business days whenever an Authorized User is added or removed.
Identification of Authorized Users. The Participant shall provide Redwood MedNet with a list identifying all that Participant’s Authorized Users, in accordance with the requirements described in the Policies and Procedures. The Participant shall restrict access to the System and, if applicable, use of the Services, only to the Authorized Users that the Participant has so identified to Redwood MedNet. The Participant shall inform Redwood MedNet in writing within two (2) business days whenever an Authorized User is added or removed.
Identification of Authorized Users. Each Participant shall identify, in accordance with the NDHIN Policies and Procedures, all of the Participant's Authorized Users and the level of access to the Hosted System and the Hosted Applications to be provided to each Authorized User. The NDHIN shall establish a user name and password for each Authorized User.
Identification of Authorized Users. Each Participant shall maintain a list identifying all of Participant’s Authorized Users and the unique system identification for each. Participant shall update such list whenever an Authorized User is added or removed by reason of termination of employment or otherwise. Participant shall provide SCHIP with a copy of this list upon request.
Identification of Authorized Users. Each Participant shall identify, in accordance with the SHIN-NY Policy Standards and the RHIO Policies and Procedures, all of the Participant’s Authorized Users and the level of access to the RHIO System and the RHIO Services to be provided to such Authorized User. A unique identifier shall be established for each Authorized User.
Identification of Authorized Users. Participant shall provide HEALTHeLINK with a list, in a medium and format approved by HEALTHeLINK, identifying all of Participant’s “Authorized Users,” together with the information and any items required regarding Authorized Users pursuant to the Policies and Procedures and the Participant’s Registration Application. This list shall enable HEALTHeLINK to establish a unique identifier for each Authorized User. Participant shall notify HEALTHeLINK of termination of employment or affiliation of an Authorized User of Participant and take such other actions as are required by the Policies and Procedures with respect to such former Authorized User and take steps within its systems and control to ensure that each former Authorized User’s access is terminated.
AutoNDA by SimpleDocs
Identification of Authorized Users. To enable HEALTHeLINK to establish appropriate access for each Authorized User, each Participant shall provide HEALTHeLINK with a list in a medium and format approved by HEALTHeLINK identifying all of the Participant’s Authorized Users, together with the information described in Policies and Procedures. Thereafter, the Participant shall provide notification to HEALTHeLINK whenever an Authorized User is added or removed byfor any reason of termination of employment,or when there is a change in an A uthorized User’s role or responsibilities, or otherwise, and notifyrequiring notice to HEALTHeLINK of such changeunder the Policies and Procedures.
Identification of Authorized Users. Each Participant shall adopt and implement a protocol for the selection and identification of that Participant’s Authorized Users, and for those Authorized Users’ use of the System and the Services, according to this Section 3.1 (Identification of Authorized Users) and Exhibit D (Data Security Requirements) a copy of which protocol shall be provided to HIO upon request. Such protocol shall comply with the requirements set forth in the Policies, Procedures and Standards, and shall describe, without limitation, the process by which the Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services, the process by which the Participant shall verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services and the process by which the Participant shall notify HIO of the removal of users from the Authorized User list. Each Participant shall comply with such protocol in all material respects.
Identification of Authorized Users. Each Participant shall adopt and implement a protocol for the selection and identification of that Participant’s Authorized Users, and for those Authorized Users’ use of the System and the Services, a copy of which protocol shall be provided to SJCHIE upon request. Such protocol shall comply with the requirements therefor set forth in the Policies and Procedures, and shall describe, without limitation, the process by which the Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services and to verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services. Each Participant shall comply with such protocol in all material respects.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!