Identification of Authorized Users Sample Clauses

Identification of Authorized Users. To enable HEALTHeLINK to establish appropriate access for each Authorized User, each Participant shall provide HEALTHeLINK with a list in a medium and format approved by HEALTHeLINK identifying all of the Participant’s Authorized Users, together with the information described in Policies and Procedures. Thereafter, the Participant shall provide notification to HEALTHeLINK whenever an Authorized User is added or removed for any reason or when there is a change in an Authorized User’s role requiring notice to HEALTHeLINK under the Policies and Procedures.
AutoNDA by SimpleDocs
Identification of Authorized Users. To enable HealtheConnections to establish appropriate access for each Authorized User, each Participant shall provide HealtheConnections with a list in a medium and format approved by HealtheConnections identifying all of the Participant’s Authorized Users, together with the information described in Policies and Procedures. Thereafter, the Participant shall provide notification to HealtheConnections whenever an Authorized User is added or removed by reason of termination of employment or otherwise and notify HealtheConnections to such change within 48 hours or as reasonably practical.
Identification of Authorized Users. The Participant shall provide HealtHIE Nevada with a list identifying all that Participant’s Authorized Users, in accordance with the requirements described in the Policies and Procedures. The Participant shall restrict access to the System and, if applicable, use of the Services, only to the Authorized Users that the Participant has so identified to HealtHIE Nevada. The Participant shall inform HealtHIE Nevada in writing within two (2) business days whenever an Authorized User is added or removed.
Identification of Authorized Users. The Participant shall provide Redwood MedNet with a list identifying all that Participant’s Authorized Users, in accordance with the requirements described in the Policies and Procedures. The Participant shall restrict access to the System and, if applicable, use of the Services, only to the Authorized Users that the Participant has so identified to Redwood MedNet. The Participant shall inform Redwood MedNet in writing within two (2) business days whenever an Authorized User is added or removed.
Identification of Authorized Users. Each Participant shall identify, in accordance with the NDHIN Policies and Procedures, all of the Participant's Authorized Users and the level of access to the Hosted System and the Hosted Applications to be provided to each Authorized User. The NDHIN shall establish a user name and password for each Authorized User.
Identification of Authorized Users. Each Participant shall maintain a list identifying all the Participant’s Authorized Users and the unique system identification for each. The Participant shall update such list whenever an Authorized User is added or removed by reason of termination of employment or otherwise. Participant shall provide AHIE with a copy of this list upon request.
Identification of Authorized Users. Participant shall provide HEALTHeLINK with a list, in a medium and format approved by HEALTHeLINK, identifying all of Participant’s “Authorized Users,” together with the information and any items required regarding Authorized Users pursuant to the Policies and Procedures and the Participant’s Registration Application. This list shall enable HEALTHeLINK to establish a unique identifier for each Authorized User. Participant shall notify HEALTHeLINK of termination of employment or affiliation of an Authorized User of Participant and take such other actions as are required by the Policies and Procedures with respect to such former Authorized User and take steps within its systems and control to ensure that each former Authorized User’s access is terminated.
AutoNDA by SimpleDocs
Identification of Authorized Users. Each Participant shall identify, in accordance with the SHIN-NY Policy Standards and the RHIO Policies and Procedures, all of the Participant’s Authorized Users and the level of access to the RHIO System and the RHIO Services to be provided to such Authorized User. A unique identifier shall be established for each Authorized User.
Identification of Authorized Users. Exchange Member shall provide MHiE with a list, in the medium and format approved by MHiE, identifying all of Exchange Member’s “Authorized Users,” together with the information and any items required regarding Authorized Users pursuant to the Policies and Procedures. This list shall enable MHiE to establish a unique identifier for each Authorized User. Exchange Member shall immediately notify MHiE of termination of employment or affiliation of an Authorized User of Exchange Member and take such other actions as are required by the Policies and Procedures with respect to such former Authorized User and take steps within its systems and control to ensure that the former Authorized User is informed of the change when and if his or her access is terminated.MHiE will periodically audit Exchange Member’s Authorized Users to ensure compliance with this Section and Sections 6.1 and 11.3. IF MHIE DISCOVERS THAT PERSONS OTHER THAN AUTHORIZED USERS (E.G., TERMINATED EMPLOYEES)HAVE ACCESS TO THE MHIE SYSTEM, THEN MHIE MAY, NOTWITHSTANDING ANY OTHER PROVISION OF THE AGREEMENT, IMMEDIATELY TERMINATEEXCHANGE MEMBER’S ACCESS TO THE MHIE SYSTEM.
Identification of Authorized Users. Each Participant shall adopt and implement a protocol for the selection and identification of that Participant’s Authorized Users, and for those Authorized Users’ use of the System and the Services, a copy of which protocol shall be provided to SJCHIE upon request. Such protocol shall comply with the requirements therefor set forth in the Policies and Procedures, and shall describe, without limitation, the process by which the Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services and to verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services. Each Participant shall comply with such protocol in all material respects.
Time is Money Join Law Insider Premium to draft better contracts faster.