Participant’s Users and System Access Policies Sample Clauses

Participant’s Users and System Access Policies. Each Participant shall have written policies and procedures in place that govern its Participant Usersability to access information on or through the Participant’s System and through the Network (“Participant Access Policies”). Each Participant acknowledges that Participant Access Policies will differ among them as a result of differing Applicable Law and business practices. At a minimum, each Participant shall ensure that it has a valid and enforceable written agreement with each of its Participant Users, and/or policies and procedures that Participant Users are required to comply with, that ensure that any Health Data accessed by its Participant Users is: (i) for a Permitted Purpose; (ii) supported by appropriate legal authority for obtaining the Health Data; (iii) requested and viewed by a Participant User with the legal authority to have such access, and (iv) as soon as reasonably practicable after determining that a Breach occurred, report such Breach to the Participant. Further, each Participant shall employ a process for identity proofing that meets or exceeds National Institutes of Standards and Technology (NIST) Level 3 requirements in effect as of the date of execution of this Agreement by which the Participant, or its designee, validates sufficient information to uniquely identify each person seeking to become a Participant User prior to issuing credentials that would grant the person access to the Participant’s System. Participant is solely responsible for authenticating Participant’s own Participant Users for that access. Each Participant represents that it shall have the ability to monitor and audit all access to and use of its System related to this Agreement, for system administration, security, and other legitimate purposes. Each Participant agrees to enforce the provisions of this Agreement including but not limited to any provisions regarding limitations on Permitted Purposes for access to the Health Data and any confidentiality provisions of this Agreement by appropriately training all Participant Users, and disciplining individuals within each Participant’s organization who violate such provisions pursuant to each Participant’s respective Participant Access Policies. Participant shall also require that its Participant Users keep on file any signed patient authorization or consent forms that may be required for documentation regarding access to Health Data from the Network, as well as any documentation of emergency accesses of Health ...
AutoNDA by SimpleDocs

Related to Participant’s Users and System Access Policies

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • Service Level Agreements If a Service or a Plan includes a Service Level Agreement (SLA):

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference. Adherence to these accessible technology standards is one way to ensure compliance with the College’s underlying legal obligations to ensure that people with disabilities are able to acquire the same information, engage in the same interactions, and enjoy the same benefits and services within the same timeframe as their nondisabled peers, with substantially equivalent ease of use; that they are not excluded from participation in, denied the benefits of, or otherwise subjected to discrimination in any College programs, services, and activities delivered online, as required by Section 504 and the ADA and their implementing regulations; and that they receive effective communication of the College’s programs, services, and activities delivered online.

  • Service Level Agreement Subject to the terms and conditions of this Agreement, Bank agrees to perform the custody services provided for under this Agreement in a manner that meets or exceeds any service levels as may be agreed upon by the parties from time to time in a written document that is executed by both parties on or after the date of this Agreement, unless that written document specifically states that it is not contractually binding. For the avoidance of doubt, Bank’s Service Directory shall not be deemed to be such a written document.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Your Guide to Selecting a Primary Care Provider (PCP) and Other Providers Quality healthcare begins with a partnership between you and your primary care provider (PCP). When you need care, call your PCP, who will help coordinate your care. Your healthcare coverage under this plan is provided or arranged through our network of PCPs, specialists, and other providers. You’re encouraged to: • become involved in your healthcare by asking providers about all treatment plans available and their costs; • take advantage of the preventive health services offered under this plan to help you stay healthy and find problems before they become serious. Each member is required to provide the name of his or her PCP. However, if the name of a PCP is not provided with the application, your enrollment will not be delayed and your coverage will not be cancelled. How to Find a PCP or Other Providers Finding a PCP in our network is easy. To select a provider, or to check that a provider is in our network, please use the “Find a Doctor” tool on our website or call Customer Service. Please note: We are not obligated to provide you with a provider. We are not liable for anything your provider does or does not do. We are not a healthcare provider and do not practice medicine, dentistry, furnish health care, or make medical judgments.

  • Use of Basement and Service Areas The basement(s) and service areas, if any, as located within the (project name), shall be earmarked for purposes such as parking spaces and services including but not limited to electric sub-station, transformer, DG set rooms, underground water tanks, pump rooms, maintenance and service rooms, fire fighting pumps and equipment's etc. and other permitted uses as per sanctioned plans. The Allottee shall not be permitted to use the services areas and the basements in any manner whatsoever, other than those earmarked as parking spaces, and the same shall be reserved for use by the association of allottees formed by the Allottees for rendering maintenance services.

Time is Money Join Law Insider Premium to draft better contracts faster.