Identity Proofing Sample Clauses

Identity Proofing. Each QHIN’s security policy shall include the following identity proofing requirements: (i) QHINs. Prior to the issuance of access credentials, each QHIN shall identity proof any staff or users at the QHIN who may initiate a QHIN Query or QHIN Message Delivery at a minimum of IAL2.
AutoNDA by SimpleDocs
Identity Proofing. Each Participant’s security policy shall include the following identity proofing requirements:
Identity Proofing. Each Participant Member’s security policy shall require that Individual Users with whom it has a Direct Relationship be identity proofed at a minimum of IAL2 prior to issuance of access credentials by the Participant Member. The identity information may be supplemented by Participant Members acting as an authoritative source by using knowledge of the identity of the individuals in accordance with written policies and procedures. Such policies and procedures must be commensurate with the risk of incorrect identity proofing (e.g., procedures for applicants receiving credentials to access their medical information may be less rigorous than procedures used for applicants receiving credentials that can be used to access medical information on multiple patients). For example, IAL2 identity proofing for an applicant receiving credentials to access to his or her own medical information can be accomplished by any two of the following: a) physical comparison to legal photographic identification cards such as driver’s licenses or passports, or employee or school identification badges; b) comparison to information from an insurance card that has been validated with the issuer, (e.g., in an eligibility check within two days of the proofing event); and c) comparison to information from an electronic health record (EHR) containing information entered from prior encounters. All personally identifiable information collected shall be limited to the minimum necessary to resolve a unique identity and the Participant Member shall not copy or retain such personally identifiable information.
Identity Proofing. Prior to the issuance of access credentials, an Individual User shall be required to verify his or her identity at a minimum of IAL2 with the QHIN, Participant, or Participant Member to whom the Individual has a Direct Relationship.
Identity Proofing. You certify that you are a duly licensed, registered, and authorized health care provider (or is employed by, or subject to the direction and control of, a duly licensed, registered and authorized health care provider); and that you have been identity-proofed and authenticated in accordance with industry standards to Surescripts’ reasonable satisfaction.
Identity Proofing a. Provider Organizations shall use reasonable and prudent means to validate an Applicant’s identity, and the Trust Agent’s identity, in accordance with applicable laws, policies, rules, and regulations (collectively, the “Rules”), which currently includes obtaining proof of identify for employees or workforce members. b. Applicants whose identity has been verified by Provider Organization prior to the effective date of this Provider Organization Trust Agent Agreement through an existing identity verification procedure that complies with the requirements above do not require further verification or identity proofing.

Related to Identity Proofing

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Contractor Name Business License #: Address: City, State, Zip Code: Telephone: Facsimile: Email: * If you are an independent contractor you are required to obtain a business license with the City of Thousand Oaks. Contractor certifies under penalty of perjury that Contractor is a Sole Proprietor Corporation Limited Liability Company Partnership Nonprofit Corporation Other [describe: ]

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • CONTRACTOR NAME CHANGE An amendment is required to change the Contractor's name as listed on this Agreement. Upon receipt of legal documentation of the name change the State will process the amendment. Payment of invoices presented with a new name cannot be paid prior to approval of said amendment.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.

  • Review of Documentation The Depositor, by execution and delivery hereof, acknowledges receipt of the Mortgage Files pertaining to the Mortgage Loans listed on the Mortgage Loan Schedule, subject to review thereof by Xxxxx Fargo Bank National Association, LaSalle Bank National Association, Deutsche Bank National Trust Company and U.S. Bank National Association as applicable (each, a “Custodian” and, together, the “Custodians”), for the Depositor. Each Custodian is required to review, within 45 days following the Closing Date, each applicable Mortgage File. If in the course of such review the related Custodian identifies any Material Defect, the Seller shall be obligated to cure such Material Defect or to repurchase the related Mortgage Loan from the Depositor (or, at the direction of and on behalf of the Depositor, from the Trust Fund), or to substitute a Qualifying Substitute Mortgage Loan therefor, in each case to the same extent and in the same manner as the Depositor is obligated to the Trustee and the Trust Fund under Section 2.02(c) of the Trust Agreement.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Vendor Logo (Supplemental Vendor Information Only) No response Optional. If Vendor desires that their logo be displayed on their public TIPS profile for TIPS and TIPS Member viewing, Vendor may upload that logo at this location. These supplemental documents shall not be considered part of the TIPS Contract. Rather, they are Vendor Supplemental Information for marketing and informational purposes only. Some participating public entities are required to seek Disadvantaged/Minority/Women Business & Federal HUBZone ("D/M/WBE/Federal HUBZone") vendors. Does Vendor certify that their entity is a D/M/WBE/Federal HUBZone vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. NO Some participating public entities are required to seek Historically Underutilized Business (HUB) vendors as defined by the Texas Comptroller of Public Accounts Statewide HUB Program. Does Vendor certify that their entity is a HUB vendor? If you respond "Yes," you must upload current certification proof in the appropriate "Response Attachments" location. No Can the Vendor provide its proposed goods and services to all 50 US States? Yes

  • Proposed Policies and Procedures Regarding New Online Content and Functionality By October 31, 2017, the School will submit to OCR for its review and approval proposed policies and procedures (“the Plan for New Content”) to ensure that all new, newly-added, or modified online content and functionality will be accessible to people with disabilities as measured by conformance to the Benchmarks for Measuring Accessibility set forth above, except where doing so would impose a fundamental alteration or undue burden. a) When fundamental alteration or undue burden defenses apply, the Plan for New Content will require the School to provide equally effective alternative access. The Plan for New Content will require the School, in providing equally effective alternate access, to take any actions that do not result in a fundamental alteration or undue financial and administrative burdens, but nevertheless ensure that, to the maximum extent possible, individuals with disabilities receive the same benefits or services as their nondisabled peers. To provide equally effective alternate access, alternates are not required to produce the identical result or level of achievement for persons with and without disabilities, but must afford persons with disabilities equal opportunity to obtain the same result, to gain the same benefit, or to reach the same level of achievement, in the most integrated setting appropriate to the person’s needs. b) The Plan for New Content must include sufficient quality assurance procedures, backed by adequate personnel and financial resources, for full implementation. This provision also applies to the School’s online content and functionality developed by, maintained by, or offered through a third-party vendor or by using open sources. c) Within thirty (30) days of receiving OCR’s approval of the Plan for New Content, the School will officially adopt, and fully implement the amended policies and procedures.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!