Unique User Identification Clause Samples

POPULAR SAMPLE Copied 1 times
Unique User Identification. 1. UM shall provide the Internal Monitor with a plan to require a unique name and/or number identifying and tracking users of all information systems that contain ePHI, including departmental shared network drives. UM shall provide the plan to require a unique user name and/or number to the Internal Monitor for review and approval within ninety (90) days of HHS’s approval of UM’s risk analysis and risk management plan required by Section V.B. 2. Within fifteen (15) days of receiving approval from the Internal Monitor, UM shall provide the plan to HHS for review and approval. Upon receiving notice from HHS specifying any required changes, UM shall make the required changes and provide the revised plan to HHS and the Internal Monitor within thirty (30) days. 3. Upon receiving approval of its plan from HHS, UM shall begin implementing the plan within thirty (30) days of receipt of HHS's approval. 4. UM shall provide the Internal Monitor with quarterly updates of the progress of the plan including documentation.
Unique User Identification. Business Associate will assign a unique user ID and password for identifying and tracking user identity and will not allow the use of shared accounts.
Unique User Identification. (Required)
Unique User Identification. All employees will be assigned a unique username and number for identifying and tracking user identity. a. Each computer user shall be assigned a unique username and number (“user ID”). The user ID, as well as a password chosen by the employee in accordance with GCHD password policy, will be required to access any GCHD system. An individual may be assigned the same user ID for access to multiple systems. b. The Manager of Information Technology or designee will provide the computer user with a user ID. A record of all user IDs will be maintained in a secure setting. c. User IDs will be immediately deactivated, and user access will be revoked upon the resignation or termination of an employee.
Unique User Identification. The Company will require user Authentication for all Workforce members seeking Access to network applications or systems containing ePHI. That Authentication will require a unique identifier (e.g., a log-in user ID) for each user. See also Person or Entity Authentication (Section V-E). Workforce members are instructed not to allow others to use their unique user ID and password, smart card, or Authentication information. Workforce members will make a reasonable effort to verify the Authentication of the person or entity receiving ePHI prior to transmission. Anonymous users will not be permitted Access to ePHI. All vendor-supplied passwords will be changed when new software or hardware is added to an electronic Information System containing ePHI, or when new software or hardware has Access to such a system.