Information Access Management Sample Clauses
Information Access Management. 1.3.1. Bizagi shall implement policies and procedures for granting access to Bizagi’s platform components, establishment, documentation, review, and modification of user’s right of access to those components, as well as procedures to verify that a person or entity seeking access to them is the one claimed.
1.3.2. In terms of authentication the Cloud Services support integration with Identity Management services by means of industry renowned standards.
1.3.3. Identity managers in the Cloud Services shall provide secure sign-in capabilities including termination of session after a predetermined time of inactivity and users are encouraged to use a strong password policy and best practices for account settings such as: passwords maximum and minimum age, password minimum length and complexity requirements, password history validation, maximum number of login attempts and account lockout policies, and idle sessions timeout, among others.
Information Access Management. Implement access authorization policies and procedures to ensure access to EPHI is appropriate.
Information Access Management. BUSINESS ASSOCIATE will implement policies and procedures for authorizing access to electronic PHI that are consistent with the applicable requirements of the HIPAA Standards.
Information Access Management. Consistent with the Privacy Rule standard limiting uses and disclosures of PHI to the "minimum necessary," the Security Rule requires An ENTITY to implement policies and procedures for authorizing access to e-PHI only when such access is appropriate based on the user or recipient's role (role-based access).
Information Access Management
