Adequate Safeguards of PHI Sample Clauses

Adequate Safeguards of PHI. Business Associate shall implement and maintain appropriate safeguards to prevent Use or Disclosure of PHI other than as provided for by this BAA. Business Associate shall reasonably and appropriately protect the confidentially, integrity, and availability of e-PHI that it creates, receives, maintains or transmits on behalf of Covered Entity in compliance with Subpart C of 45 C.F.R. Part 164 to prevent Use or Disclosure of PHI other than as provided for by this BAA.
AutoNDA by SimpleDocs
Adequate Safeguards of PHI. Business Associate shall implement and maintain appropriate safeguards to prevent Use or Disclosure of PHI other than as provided for by this BAA. Business Associate shall comply, as applicable, with the requirements of the HIPAA Security Rule under 45 C.F.R. § 164.306, implement appropriate administrative safeguards as required by 45 C.F.R. § 164.308, disclose/request only the minimum necessary amount of PHI required to fulfill a request and comply with other requirements of 45 C.F.R. § 164.314, and adopt physical safeguards as required by 45 C.F.R. § 164.310, technical safeguards as required by 45 C.F.R. § 164.312, and written policies and procedures as required by 45 C.F.R. § 164.316 that reasonably and appropriately protect the confidentially, integrity, and availability of e-PHI that it creates, receives, maintains or transmits on behalf of Covered Entity. Business Associate shall comply with all requirements of the HITECH Act related to security that apply to Covered Entities.

Related to Adequate Safeguards of PHI

  • Standards of Conduct Whenever the Member is required or permitted to make a decision, take or approve an action, or omit to do any of the foregoing, then the Member shall be entitled to consider only such interests and factors, including its own, as it desires, and shall have no duty or obligation to consider any other interests or factors whatsoever. To the extent that the Member has, at law or in equity, duties (including, without limitation, fiduciary duties) to the Company or other person bound by the terms of this Agreement, the Member acting in accordance with the Agreement shall not be liable to the Company or any such other person for its good faith reliance on the provisions of this Agreement. The provisions of this Agreement, to the extent that they restrict the duties of the Member otherwise existing at law or in equity, replace such other duties to the greatest extent permitted under applicable law.

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Data Practices The Parties acknowledge that this Agreement is subject to the requirements of Minnesota’s Government Data Practices Act, Minnesota Statutes, Section 13.01

  • Safeguarding The Local Authority has overarching responsibility for safeguarding and promoting the welfare of all children and young people in their area. They have a number of statutory functions under the 1989 and 2004 Children Acts which make this clear, and the ‘Working Together to Safeguard Children’ 2015 guidance1 sets these out in detail.

  • Safeguard Measures The Parties note the multilateral negotiations pursuant to Article X of GATS on the question of emergency safeguard measures based on the principle of non-discrimination. Upon the conclusion of such multilateral negotiations, the Parties shall conduct a review for the purpose of discussing appropriate amendments to this Agreement so as to incorporate the results of such multilateral negotiations.

  • Standards of Care Seller shall comply with all applicable requirements of Law, the Transmission Provider, Utility Distribution Company, Governmental Approvals, the CAISO, CARB, FERC, NERC and WECC in its scheduling, interconnection, operation and maintenance of the Project and as contemplated by this Agreement. Seller shall (a) acquire and maintain all Governmental Approvals necessary for the construction, operation, and maintenance of the Project consistent with Safety Requirements; (b) Notify Buyer of any material modifications or lapse in renewal of Governmental Approvals; and (c) at Buyer’s request, provide to Buyer digital copies of any Governmental Approvals. For the avoidance of doubt, Seller shall be responsible for procuring and maintaining, at its expense, all emissions credits required for operation of the Project throughout the Delivery Term in compliance with Law and to permit operation of the Project in accordance with this Agreement. Promptly following Xxxxx’s written request, Xxxxxx agrees to take all commercially reasonable actions and execute or provide any documents, information, or instruments with respect to Product reasonably necessary to enable Buyer to comply with the requirements of any Governmental Authority. Nothing hereunder shall cause Buyer to assume any liability or obligation with respect to Seller’s compliance obligations with respect to the Project under any new or existing Laws, rules, or regulations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!