Training of Participants’ Authorized Users Sample Clauses

Training of Participants’ Authorized Users. Participant shall provide appropriate and adequate training to all of the Participant’s designated Authorized Users, prior to becoming Authorized Users, in accordance with the requirements of applicable laws and regulations governing the confidentiality, privacy, and security of protected health information, including without limitation requirements imposed under HIPAA.
AutoNDA by SimpleDocs

Related to Training of Participants’ Authorized Users

  • Leave of Absence for Employees Who Serve as Local Coordinators for the Ontario Nurses' Association An employee who serves as Local Coordinator for the Ontario Nurses' Association shall be granted leave of absence without pay up to a total of thirty-five (35) days annually. Leave of absence for Local Coordinators for the Ontario Nurses' Association will be separate from the Union leave provided in (a) above.

  • Authorized Employees Contractor acknowledges that Section285.530, RSMo, prohibits any business entity or employer from knowingly employing, hiring for employment, or continuing to employ an unauthorized alien to perform work within the State of Missouri. Contractor therefore covenants that is not knowingly in violation of subsection 1 or Section 285.530, RSMo, and that it will not knowingly employ, hire for employment, or continue to employ any unauthorized aliens to perform work on the Project, and that its employees are lawfully to work in the United States.

  • Processing of Customer Personal Data 3.1 UKG will:

  • Processing of Company Personal Data 2.1 Processor shall:

  • Restricted Employment for Certain State Personnel Contractor acknowledges that, pursuant to Section 572.069 of the Texas Government Code, a former state officer or employee of a state agency who during the period of state service or employment participated on behalf of a state agency in a procurement or contract negotiation involving Contractor may not accept employment from Contractor before the second anniversary of the date the Contract is signed or the procurement is terminated or withdrawn.

  • Selection Criteria for Awarding Task Order The Government will award to the offeror whose proposal is deemed most advantageous to the Government based upon an integrated assessment using the evaluation criteria. The Government will evaluate proposals against established selection criteria specified in the task order RFP. Generally, the Government's award decision will be based on selection criteria which addresses past performance, technical acceptability, proposal risk and cost. Among other sources, evaluation of past performance may be based on past performance assessments provided by TO Program Managers on individual task orders performed throughout the life of the contract. The order of importance for the factors will be identified in the RFP for the specified task order.

  • Leave of Absence for College Committees An employee whose assigned work schedule would prevent her/him from attending meetings of a college committee to which s/he has been elected or appointed, will be granted a leave of absence from her/his regular duties without loss of pay or other entitlements to attend such meeting(s). Where such leave is granted, the employer will replace the employee as necessary. Costs arising from this provision will not be charged against the program area of the participating employee.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Terms of Service In a Cloud environment, Red Hat’s Software Subscriptions may provide you with access to the Software and associated maintenance (updates, upgrades, corrections, security advisories and bug fixes), if and when available, in the form of software images intended to be deployed as virtual instances. Payments to Red Hat for Software Subscriptions do not include any fees that may be due to the Vendor for the Vendor’s Cloud services. Red Hat is not a party to your agreement with the Vendor and is not responsible for providing access to the Vendor’s Cloud or any other obligations of the Vendor under such agreement. The Vendor is solely responsible and liable for the Vendor’s Cloud. You may use the Services only for your own internal use within the Vendor’s Cloud. Use of the Software Subscription other than as set forth herein, including either access to the Software and/or Services outside the Vendor Cloud will be subject to additional fees as set forth in Section 5 below.

  • Customer’s Processing of Personal Data Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the means by which Customer acquired Personal Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!