Synetic System definition
Examples of Synetic System in a sentence
Synetic System" shall mean the facilities, computer hardware and software and the communications network and related services, which Synetic shall use to provide the Clinical Transaction Services.
Synetic shall obtain, and Payer will cooperate with Synetic in obtaining, any necessary consents, licenses and approvals of Synetic's licensors or other providers with respect to Payer's use of the Synetic System and the Clinical Transaction Services.
Synetic agrees that Synetic shall provide, as part of the Synetic System, all reasonable security measures.
Require End-Users to obtain the appropriate level of patient consent when using the Synetic System to request any confidential patient information; capture and store all representations by End-Users.
Synetic will provide the high speed telecommunications connections and supporting equipment required to maintain connectivity between the Synetic System and the Payer System for the Clinical Transaction Services.
In addition, Synetic warrants that such Clinical Transaction Services will be performed, and the Synetic System will be managed, in accordance with the Performance Standards set forth in Schedule G.
Moreover, Synetic shall employ reasonable system security measures to ensure that only authorized personnel and End-Users have access to the Synetic System.
Payer acknowledges that Synetic will provide Clinical Transaction Services to other Healthcare-Payers, and that the Synetic System and the Clinical Transaction Services will be open to all Healthcare-Payers and healthcare providers.
Payer shall establish all interfaces to the Synetic System from the Payer System and modify the Payer System to provide additional capabilities as are reasonably necessary for the proper use of the Clinical Transaction Services.
Synetic will establish a security and confidentiality program and policies to protect against unauthorized access to the Synetic System and the Payer Proprietary Materials, which program and policies will be reviewed by an independent third party that is a recognized expert in the area of systems security.