Common use of Identification of Authorized Users Clause in Contracts

Identification of Authorized Users. Each Participant shall adopt and implement a protocol for the selection and identification of that Participant’s Authorized Users, and for those Authorized Users’ use of the System and the Services, according to this Section 3.1 (Identification of Authorized Users) and Exhibit D (Data Security Requirements) a copy of which protocol shall be provided to HIO upon request. Such protocol shall comply with the requirements set forth in the Policies, Procedures and Standards, and shall describe, without limitation, the process by which the Participant shall uniquely identify each individual as an Authorized User prior to allowing that individual to use the System and the Services, the process by which the Participant shall verify the credentials of each Authorized User prior to enabling that Authorized User to use the System and the Services and the process by which the Participant shall notify HIO of the removal of users from the Authorized User list. Each Participant shall comply with such protocol in all material respects.

Appears in 2 contracts

Sources: Health Information Exchange Organization Participation Agreement, Health Information Exchange Organization Participation Agreement