Participant Policies and Procedures Sample Clauses

Participant Policies and Procedures. From time to time, HealthierHere may adopt, amend, repeal, and replace policies and procedures that pertain to use of the CIE and Shared Data (“Policies a ProcedPuarrticeipasnt”sh)al.l comply with all Policies and Procedures. The Policies and Procedures will provide guidance to Participant on such topics as security measures required to protect Shared Data, notifying HealthierHere in the event the Participant experience a Security Incident, referral acceptance/rejection response times and outcome reporting requirements, among other things. The Policies and Procedures may be posted on the HealthierHere website. HealthierHere may modify, amend, or replace the Policies and Procedures, in its reasonable discretion, from time to time, and the change or modification shall Pbarteicipadnteonethme edadte theey ffareective an posted to HealthiweebrsitHe.eMroed’isfications to thethatPmaotelriaillycchianeges and Pr Community Information Exchange Participation Agreement Version 1.1 Participant's obligations, liability, or ability to participate in the CIE shall require the prior approval of the CIEgo’vesrnance body. Participant may terminate this Agreement upon the adoption of such modified Policies and Procedures as provided below for early termination. Modifications to Procedures that are required by Applicable Law shall not be deemed a material change and Participant shall comply with all such Policies and Procedures.
Participant Policies and Procedures. From time to time, 2-1-1 San Diego may adopt, amend, repeal and replace policies and procedures that pertain to use of the Database and processing of referrals (hereafter, “Policies and Procedures”). The Policies and Procedures will provide guidance to Participants on such topics as security measures required to protect Client Data, notifying 2-1-1 San Diego in the event the Participant experiences a Security Breach, referral acceptance/rejection response times and outcome reporting requirements, among other things. The Policies and Procedures may be posted on the 2-1-1 San Diego website at ▇▇▇.▇▇▇▇▇▇▇▇▇▇▇.▇▇▇, and are hereby incorporated in this Agreement by this reference as if fully set forth. 2-1-1 San Diego may modify, amend or replace the Participant Policies and Procedures, in its reasonable discretion, from time to time, and the change or modification shall be deemed effective and binding upon Participant on the date indicated, but not less than sixty (60) days from the date Participant receives the modified Policies. Material modifications to the Policies and Procedures shall require the prior approval of the 2-1-1
Participant Policies and Procedures. Participant will ensure compliance with its own applicable privacy and security policies and procedures as required under applicable law. Participant may be asked to provide evidence of compliance with their own privacy and security policies and procedures relevant to this Agreement, upon reasonable written notice by healtheConnect. If a Participant needs assistance with such policies and procedures, it should notify healtheConnect prior to entering into this Agreement, and healtheConnect will provide assistance to the extent that such resources are available.
Participant Policies and Procedures. From time to time, HealthierHere may adopt, amend, repeal, and replace policies and procedures that pertain to use of the CIE and Shared Data (“Policies and Procedures”). Participant shall comply with all Policies and Procedures. The Policies and Procedures will provide guidance to Participant on such topics as security measures required to protect Shared Data, notifying HealthierHere in the event the Participant experience a Security Incident, referral acceptance/rejection response times and outcome reporting requirements, among other things. The Policies and Procedures may be posted on the HealthierHere website. HealthierHere may modify, amend, or replace the Policies and Procedures, in its reasonable discretion, from time to time, and the change or modification shall be deemed effective and binding upon Participant on the date they are posted to HealthierHere’s website. Modifications to the Policies and Procedures that materially change Community Information Exchange Participation Agreement Version 1.2 Participant's obligations, liability, or ability to participate in the CIE shall require the prior approval of the CIE’s governance body. Participant may terminate this Agreement upon the adoption of such modified Policies and Procedures as provided below for early termination. Modifications to the Policies and Procedures that are required by Applicable Law shall not be deemed a material change and Participant shall comply with all such Policies and Procedures.

Related to Participant Policies and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees. 7.1.2 The Employees will observe and act in accordance with Company policies and procedures that apply to the Employees, as implemented and amended from time to time.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the Company’s Policies and Procedures as they may exist from time to time.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.