Common use of Identification of Authorized Users Clause in Contracts

Identification of Authorized Users. Participant shall adopt and implement policies and procedures for the selection and identification of Authorized Users and their access to and use of the System and the Services, a copy of which shall be provided to SCHIO upon written request. Such policies and procedures shall comply with the requirements therefor set forth in the SCHIO Policies and Procedures, and shall describe, without limitation, the process by which Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services and to verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services. Participant shall comply with such policies and procedures in all material respects.

Appears in 2 contracts

Sources: Participation Agreement, Participation Agreement

Identification of Authorized Users. Each Participant shall adopt and implement policies and procedures a protocol for the selection and identification of that Participant’s Authorized Users Users, and their access to and for those Authorized Users’ use of the System and the Services, a copy of which protocol shall be provided to SCHIO SJCHIE upon written request. Such policies and procedures protocol shall comply with the requirements therefor set forth in the SCHIO Policies and Procedures, and shall describe, without limitation, the process by which the Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services and to verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services. Each Participant shall comply with such policies and procedures protocol in all material respects.

Appears in 1 contract

Sources: Participation Agreement