Identification and Authorization Sample Clauses

Identification and Authorization. The Academy agrees with the use of two-factor or multi-factor authentication for requests from patients. We are concerned, however, about the use of vague language in 1 Dr. Xxxxx Xxxxx, President-elect American Medical Association, EHR Innovation and Problem- Solving: Physician Perspective, 2016, available at: xxxxx://xxx.xxxxxxxx.xxx/sites/default/files/David_Barbe-Innovation_&_Problem-Solving.pdf.
AutoNDA by SimpleDocs
Identification and Authorization. You must provide to Weblite and keep current the following information: (i) your full name and the name of the authorised person for contact purposes, (ii) your postal address, (ii) your email address, (iv) your voice telephone number and fax number (if available), and (v) contact details for your technical contact and billing contact. Weblite may require you to supply photo identification (such as a passport or current drivers’ licence) to verify your identity and, in the case of a company, authorization to act on behalf of the company. Weblite may also require you to provide evidence to its reasonable satisfaction of your right and authority to register a particular domain name. You acknowledge and agree that:
Identification and Authorization. Each user authenticates in the application using e-mail address and password (password-based authentication), which established during the registration process: ✓ The password established by the user must have a minimum of 8 characters ✓ The password can be changed by the user at any time after providing the current password ✓ The password is sent to the application via a secure communication channel and is stored as a strong irreversible hash in a protected database. Additionally, while setting the password, the user has the possibility to check how strong the password is in order to establish its proper length and complexity. The authentication process is protected against brute force attacks that attempt to guess the user's password. Each correctly authenticated user receives a long, random, unique token with high entropy, which authorizes him to perform authorized actions in the application. This token loses its value when the user logs out of the application and cannot be used again to authorize his/her requests. Access control in the application is implemented based on the RBAC (role-based access control) model, which is configurable by the project owner. • Measures for the protection of data during transmission. All traffic exchanged between the user and the application is encrypted using TLS protocol with strong cryptographic algorithms. This provides protection against attacks trying to eavesdrop the communication between the user and the application. What is more, the communication with the application over the encrypted channel is forced by the application itself. • Measures for the protection of data during storage. Access is granted only to employees who need it to perform their duties. The access list is reviewed on an ongoing basis. • Measures for ensuring physical security of locations at which personal data are processed. Personal information is held on servers provided by our third-party service provider, which ensures that only authorized employees have physical access to the servers. Additionally, the data centers where the servers are located are continuously monitored and protected by guards. The server rooms are equipped with fire suppression systems. • Measures for ensuring events logging. Applications and services offered by Xxxxx log detailed information about: successful and unsuccessful login attempts, created accounts, password recovery processes, data access, changes in account settings and other relevant events. All logs go t...
Identification and Authorization. Xxxxxxx.xx will maintain access controls and policies to manage what access is allowed to the Xxxxxxx.xx network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. Physical Security. Physical barrier controls are used to prevent unauthorized entrance to facilities where personal data is processed either by or on behalf of Xxxxxxx.xx. The controls exist both at the perimeter and at building access points. Entry typically requires either electronic access control validation (e.g., card access systems, etc.) or validation by human security personnel (e.g., contract or in-house security guard service, receptionist, etc.). Employees and contractors are assigned photo-ID badges that must be worn while the employees and contractors are at any of the facilities. Visitors are required to sign-in with designated personnel, must show appropriate identification, are assigned a visitor ID badge that must be worn while the visitor is at any of the facilities, and are continually escorted by authorized employees or contractors while visiting the facilities. Event logging. Xxxxxxx.xx’s network and systems are configured so that system errors and security events are logged, and the log files are protected from alternation by users.

Related to Identification and Authorization

  • Designation and Authorization 1. Each Party shall have the right to designate as many airlines as it wishes to conduct international air transportation in accordance with this Agreement and to withdraw or alter such designations. Such designations shall be transmitted to the other Party in writing through diplomatic channels, and shall identify whether the airline is authorized to conduct the type of air transportation specified in Annex I or in Annex II or both.

  • Authority and Authorization Each of the Consultants has full power and authority to enter into this Plan and carry out the obligations hereunder. Execution of this Plan and performance by the Consultants hereunder constitutes a valid and binding obligation of the Consultants and performance hereunder will not violate any other agreement to which any of the Consultants is a party.

  • Organization and Authority The Subscriber is a Delaware limited liability company, validly existing and in good standing under the laws of Delaware and possesses all requisite power and authority necessary to carry out the transactions contemplated by this Agreement. Upon execution and delivery by you, this Agreement is a legal, valid and binding agreement of Subscriber, enforceable against Subscriber in accordance with its terms, except as such enforceability may be limited by applicable bankruptcy, insolvency, fraudulent conveyance or similar laws affecting the enforcement of creditors’ rights generally and subject to general principles of equity (regardless of whether enforcement is sought in a proceeding at law or in equity).

  • Card Information Updates and Authorizations If you have authorized a merchant to xxxx charges to your card on a recurring basis, it is your responsibility to notify the merchant in the event your card is replaced, your card information (such as card number and expiration date) changes, or the account associated with your card is closed. However, if your card is replaced or card information changes, you authorize us, without obligation on our part, to provide the updated card information to the merchant in order to permit the merchant to xxxx recurring charges to the card. You authorize us to apply such recurring charges to the card until you notify us that you have revoked authorization for the charges to your card. Your card is automatically enrolled in an information updating service. Through this service, your updated card information (such as card number and expiration date) may be shared with participating merchants to facilitate continued recurring charges. Updates are not guaranteed before your next payment to a merchant is due. You are responsible for making direct payment until recurring charges resume. To revoke your authorization allowing us to provide updated card information to a merchant, please contact us.

  • Organization and Good Standing; Power and Authority Buyer is a corporation duly incorporated, validly existing and in good standing under the laws of the Commonwealth of Massachusetts. Subject to the receipt of the Regulatory Approval, Buyer has all requisite power and authority to execute, deliver, and perform its obligations under this Agreement.

  • Powers and Authority It has the power to enter into and perform, and has taken all necessary action to authorise the entry into and performance of, the Finance Documents to which it is or will be a party and the transactions contemplated by those Finance Documents.

  • PURPOSE AND AUTHORITY The parties to this agreement are the Department of Homeland Security (DHS) and the (Employer). The purpose of this agreement is to set forth terms and conditions which the Employer will follow while participating in E-Verify.

  • Corporate Authorization The execution, delivery and performance by Parent and Merger Subsidiary of this Agreement and the consummation by Parent and Merger Subsidiary of the transactions contemplated hereby are within the corporate powers of Parent and Merger Subsidiary and have been duly authorized by all necessary corporate action. This Agreement constitutes a valid and binding agreement of each of Parent and Merger Subsidiary.

  • Organization; Power and Authority The Company is a corporation duly organized, validly existing and in good standing under the laws of its jurisdiction of incorporation, and is duly qualified as a foreign corporation and is in good standing in each jurisdiction in which such qualification is required by law, other than those jurisdictions as to which the failure to be so qualified or in good standing could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company has the corporate power and authority to own or hold under lease the properties it purports to own or hold under lease, to transact the business it transacts and proposes to transact, to execute and deliver this Agreement and the Notes and to perform the provisions hereof and thereof.

  • Corporate Power and Authority Each Borrower has all requisite corporate power and authority to enter into this Amendment and to carry out the transactions contemplated by, and perform its obligations under, the Credit Agreement as amended by this Amendment (the "AMENDED AGREEMENT").

Time is Money Join Law Insider Premium to draft better contracts faster.