Access and Use Policies Clause Samples

The Access and Use Policies clause defines the rules and conditions under which parties may access and utilize certain resources, services, or information covered by the agreement. Typically, this clause outlines permissible and prohibited activities, such as restrictions on sharing login credentials, limitations on data usage, or requirements for secure access. Its core function is to ensure that resources are used appropriately and securely, thereby protecting the interests of the provider and maintaining compliance with legal or contractual obligations.
Access and Use Policies. Subscribing Organization will maintain and enforce policies and procedures to limit access and use of the Gateway Service and Service Information as follows:
Access and Use Policies. Subscribing Organization will maintain and enforce policies and procedures to limit access and use of the Gateway Service and Service Information as follows: 3.4.1. Only Authorized Users may access or use the Gateway Service; 3.4.2. Authorized Users may only access or use the Gateway Service and patient-related Service Information in accordance with the terms and conditions of this Agreement; 3.4.3. Subscribing Organization shall provide proper training to its Authorized Users on accessing and using the Gateway Service and Service Information; 3.4.4. Subscribing Organization shall ensure that Gateway Service and Service Information, and its systems used in connection therewith, are accessed and used in a secure manner in accordance with applicable law and the terms of this Agreement; and 3.4.5. Copies of said policies and procedures shall be provided upon request of a state or Service Providers.
Access and Use Policies. Healthcare Entity will maintain and enforce policies and procedures to limit access and use of the Gateway Service, Service Information, PMP data, and PMP user data as follows: 3.4.1. Only Authorized Users may access or use the Gateway Service; 3.4.2. Authorized Users may only access or use the Gateway Service and PMP data in accordance with the terms and conditions of this Agreement and with their obligations under M.G.L. c. 94c, §24A and the Terms and Conditions For Prescriber and Dispenser Use of the Massachusetts Online Prescription Monitoring Program; 3.4.3. Healthcare Entity shall provide proper training to its Authorized Users on accessing and using the PMP through the Gateway Service; 3.4.4. Healthcare Entity shall ensure that its rules for validating that only Authorized Users seek access to or use the Gateway Service, and employ processes to ensure that employees and contractors who do not provide patient care do not have access to use the Gateway Service; 3.4.5. Healthcare Entity shall ensure that its systems, used in connection with the Gateway Service are accessed and used in a secure manner in accordance with applicable law and the terms of this Agreement; and 3.4.6. Copies of said policies and procedures shall be provided upon request of the Department.
Access and Use Policies. Healthcare Entity will maintain and enforce policies and procedures to limit access and use of the Gateway Service, Service Information, PMP data, and PMP user data as follows: 3.4.1. Only Authorized Users may access or use the Gateway Service; 3.4.2. Authorized Users may only access or use the Gateway Service and PMP data in accordance with the terms and conditions of this Agreement and with their obligations under the Kansas Prescription Monitoring Program Act, K.S.A. 65-1681, et seq., any rules and regulations promulgated thereunder. 3.4.3. Healthcare Entity shall provide proper training to its Authorized Users on accessing and using the PMP through the Gateway Service; 3.4.4. Healthcare Entity shall ensure that its rules for validating that only Authorized Users seek access to or use the Gateway Service, and employ processes to ensure that employees and contractors who do not provide patient care do not have access to use the Gateway Service. 3.4.5. Healthcare Entity shall ensure that its system, used in connection with the Gateway Service are accessed and used in a secure manner in accordance with applicable law and the terms of this Agreement; and 3.4.6. Copies of said policies and procedures shall be provided upon request of the Department.
Access and Use Policies. Healthcare Entity will maintain and enforce policies and procedures to limit access and use of the Gateway Service, Service Information, PMP data, and PMP user data as follows: 3.4.1. Only Authorized Users may access or use the Gateway Service; 3.4.2. Authorized Users may only access or use the Gateway Service and PMP data in accordance with the terms and conditions of this Agreement and with their obligations under 3.4.3. Healthcare Entity shall provide proper training to its Authorized Users on accessing and using the PMP through the Gateway Service; 3.4.4. Healthcare Entity shall ensure that its rules for validating that only Authorized Users seek access to or use the Gateway Service, and employ processes to ensure that employees and contractors who do not provide patient care do not have access to use the Gateway Service; 3.4.5. Healthcare Entity shall ensure that its systems, used in connection with the Gateway Service are accessed and used in a secure manner in accordance with applicable law and the terms of this Agreement; and 3.4.6. Copies of said policies and procedures shall be provided upon request of the Department.
Access and Use Policies. The Healthcare Entity shall maintain and enforce policies and procedures to limit access and use of the Gateway Service and Service Information as follows: 3.4.1. Only Authorized Users may access or use the Gateway Service; 3.4.2. Authorized Users may only access or use the Gateway Service and patient- related Service Information in accordance with applicable state and federal law and regulations and the terms and conditions of this Agreement; 3.4.3. The Healthcare Entity shall provide proper training to its Authorized Users on accessing and using the Gateway Service and Service Information; 3.4.4. The Healthcare Entity shall ensure that Gateway Service and Service Information, and its systems used in connection therewith, are accessed and used in a secure manner in accordance with applicable state and federal law and regulations and the terms of this Agreement; and 3.4.5. Copies of said policies and procedures shall be provided upon request of the Agency.
Access and Use Policies. The Organization will maintain and enforce policies and procedures to limit access and use of the Application and Application Information as follows: 3.1.1. Only Authorized Users may access or use the Application; 3.1.2. Authorized Users may only access or use the Application and patient-related Application Information in accordance with the terms and conditions of this Agreement; 3.1.3. Organization shall provide training to its Authorized Users on accessing and using the Application and Application Information; 3.1.4. The Organization shall ensure that the Application and Application Information, and its systems used in connection therewith, are accessed and used in a secure manner in accordance with applicable law and the terms of this Agreement; and 3.1.5. Copies of said policies and procedures shall be provided to the PDMP upon request.
Access and Use Policies. Licensee will maintain and enforce policies and procedures to limit access and use of the Gateway Service and Service Information as follows: (i) Only Authorized Entities or Authorized Users may access or use the Gateway Service; (ii) Authorized Entities may only access or use the Gateway Service and Service Information in accordance with the terms and conditions of this Agreement; (iii) Authorized Users may only access or use the Gateway Service and patient-related Service Information in accordance with the terms and conditions of this Agreement; (iv) Licensee shall provide proper training to its Authorized Entities and Authorized Users on accessing and using the Gateway Service and Service Information; (v) Licensee shall ensure that Gateway Service and Service Information, and its systems used in connection therewith, are accessed and used in a secure manner in accordance with applicable law and the terms of this Agreement; and (vi) Copies of said policies and procedures shall be provided upon request of a state or Appriss.

Related to Access and Use Policies

  • Access and Use Grantee agrees to license or otherwise make available to MassCEC in perpetuity, without charge, ▇▇▇▇▇▇▇’s interest in and copyright (if any) to all non-confidential materials prepared and produced in relation to the Project, including, without limitation, all plans, specifications, and analyses developed in connection with the Project and specified as being for MassCEC’s use and public dissemination; provided, however, that any and all inventions that are conceived or first reduced to use during the course of the Project shall be the sole property of Grantee (except that if jointly invented, title shall flow in accordance with United States patent law), and any licensing requests for such inventions shall be subject to good faith negotiations between the Parties. Grantee represents and warrants that Deliverables will not infringe on any copyright, right of privacy, or personal or proprietary rights of others.

  • Access and Cooperation Each Party will, and will cause its Other Indemnified Persons to, cooperate and assist in all reasonable respects regarding such Third Party Claim, including by promptly making available to such other Party (and its legal counsel and other professional advisers with a reasonable need to know) all books and records of such Person relating to such Third Party Claim, subject to reasonable confidentiality precautions.

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • Personnel Requirements and Documentation Grantee will; 1. maintain current personnel documentation on each employee. All documents must be factual and accurate. Health-related information must be stored separately with restricted access as appropriate under Tex. Gov. Code §552.102. Training records may be stored separately from the main personnel file but must be easily accessible upon request. Required documentation includes the following, as applicable: i. A copy of the current job description signed by the employee; ii. Application or resume with documentation of required qualifications and verification of required credentials; iii. Verification of work experience; iv. Annual performance evaluations; v. Personnel data that includes date hired, rate of pay, and documentation of all pay increases and bonuses; vi. Documentation of appropriate screening and/or background checks, to include probation or parole documentation; vii. Signed documentation of initial and other required training; and viii. Records of any disciplinary actions. 2. document authentication must include signature, credentials when applicable, and date. If the document relates to past activity, the date of the activity must also be recorded. Documentation must be permanent and legible. When it is necessary to correct a required document, the error must be marked through with a single line, dated, and initialed by the writer.

  • Sources and Uses The sources and uses of the Loans shall be as set forth in Section 3.12.