Identity Proofing Sample Clauses

Identity Proofing. Each QHIN’s security policy shall include the following identity proofing requirements:
AutoNDA by SimpleDocs
Identity Proofing. Each Participant’s security policy shall include the following identity proofing requirements:
Identity Proofing. Each Participant Member’s security policy shall require that Individual Users with whom it has a Direct Relationship be identity proofed at a minimum of IAL2 prior to issuance of access credentials by the Participant Member. The identity information may be supplemented by Participant Members acting as an authoritative source by using knowledge of the identity of the individuals in accordance with written policies and procedures. Such policies and procedures must be commensurate with the risk of incorrect identity proofing (e.g., procedures for applicants receiving credentials to access their medical information may be less rigorous than procedures used for applicants receiving credentials that can be used to access medical information on multiple patients). For example, IAL2 identity proofing for an applicant receiving credentials to access to his or her own medical information can be accomplished by any two of the following:
Identity Proofing. Prior to the issuance of access credentials, an Individual User shall be required to verify his or her identity at a minimum of IAL2 with the QHIN, Participant, or Participant Member to whom the Individual has a Direct Relationship.
Identity Proofing. You certify that you are a duly licensed, registered, and authorized health care provider (or is employed by, or subject to the direction and control of, a duly licensed, registered and authorized health care provider); and that you have been identity-proofed and authenticated in accordance with industry standards to Surescripts’ reasonable satisfaction.

Related to Identity Proofing

  • Identity Verification In the case that the Subscriber provides telecommunication services to any Subscriber’s Customers pursuant to Section 8.1, the Subscriber is responsible for performing and shall perform personal identification of Subscriber’s Customer. SORACOM shall not bear any responsibility in relation to dealing with such matters.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Identity For purposes of this section, identity shall include, but not be limited to, name, identifying number, symbol or other identifying characteristic assigned to the service recipient, such as finger or voice print or a photograph.

  • Contractor Name Business License #: Address: City, State, Zip Code: Telephone: Facsimile: Email: * If you are an independent contractor you are required to obtain a business license with the City of Thousand Oaks. Contractor certifies under penalty of perjury that Contractor is a Sole Proprietor Corporation Limited Liability Company Partnership Nonprofit Corporation Other [describe: ]

  • Beëindiging Deze licentie is xxx xxxxxx totdat deze wordt beëindigd. Uw rechten ingevolge deze licentie vervallen automatisch, zonder aankondiging van Apple, als u niet voldoet aan een of meer van de voorwaarden van deze licentie. Nadat de geldigheid van deze licentie is verlopen, dient u elk gebruik van de Apple software xx xxxxxx en alle volledige of gedeeltelijke kopieën van de Apple software die in uw bezit zijn, te vernietigen.

  • Glass Or Safety Glazing Material a. We cover:

  • CONTRACTOR INTEGRITY PROVISIONS It is essential that those who seek to contract with the Commonwealth of Pennsylvania (“Commonwealth”) observe high standards of honesty and integrity. They must conduct themselves in a manner that fosters public confidence in the integrity of the Commonwealth contracting and procurement process.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Roofing a. Installation of scaffolding, polyethylene sheeting, or tarps, provided such work will not result in additional damage or irreversible alterations to character defining features.

Time is Money Join Law Insider Premium to draft better contracts faster.