Breach Pattern or Practice by Business Associate Sample Clauses

Breach Pattern or Practice by Business Associate. If the CE knows of a pattern of activity or practice of the BA that constitutes a material breach or violation of the BAs obligations under the Contract or this Exhibit “M” or other arrangement, the BA must take reasonable steps to cure the breach or end the violation. If the steps are unsuccessful, the CE must terminate the Contract or other arrangement if feasible, or if termination is not feasible, report the problem to the DHHS Secretary. CE shall provide written notice to BA of any pattern of activity or practice of the BA that CE believes constitutes a material breach or violation of the BA’s obligations under the Contract or this Exhibit “M” or other arrangement within five (5) business days of discovery and shall meet with BA to discuss and attempt to resolve the problem as one of the reasonable steps to cure the breach or end the violation. CE shall provide notice to BA as set forth in paragraph 6.
Breach Pattern or Practice by Business Associate. If Covered Entity knows of an activity or practice of Business Associate that constitutes a material breach or violation of Business Associate's obligations under this Agreement, Covered Entity must take reasonable steps to cure the breach or end the violation. If the steps are unsuccessful, Covered Entity must terminate the Business Associate's Services if feasible, or if termination is not feasible, report the activity to the Secretary. Within five (5) business days of discovery Covered Entity shall provide written notice to Business Associate of any pattern of activity or practice of Business Associate that Covered Entity believes constitutes a material breach or violation of Business Associate's obligations under this Agreement, and shall meet with Business Associate to discuss and attempt to resolve the problem as one of the reasonable steps to cure or end the violation.
Breach Pattern or Practice by Business Associate. Business Associate agrees that if Business Associate knows of a pattern of activity or practice of Business Associate that constitutes a material breach of Business Associate’s obligations under this Agreement, Business Associate shall take reasonable steps to cure the breach or end the violation. Business Associate agrees that if the steps are unsuccessful, Business Associate shall terminate this Agreement, or if termination is not feasible, report the problem to the Secretary.
Breach Pattern or Practice by Business Associate. Pursuant to 42 USC Section 17934(b), if the Business Associate knows of a pattern of activity or practice of the Subcontractor that constitutes a material breach or violation of the Subcontractor’s obligations under the Agreement or other arrangement, the Business Associate must take reasonable steps to cure the breach or end the violation. If the steps are unsuccessful, the Business Associate must terminate the Agreement or other arrangement if feasible, or if termination is not feasible, report the problem to the Secretary. Business Associate shall provide written notice to Subcontractor of any pattern of activity or practice of the Subcontractor that Business Associate believes constitutes a material breach or violation of the Subcontractor’s obligations under the Agreement within five (5) days of discovery and shall meet with Subcontractor to discuss and attempt to resolve the problem as one of the reasonable steps to cure the breach or end the violation.

Related to Breach Pattern or Practice by Business Associate

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

  • Business Associate “Business Associate” shall have the same meaning as the term “business associate” at 45 C.F.R. 160.103, and shall refer to Contractor.

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Breach by Licensee a. The licensee shall have five (5) business days from its receipt of written notice by Producer and/or Producer’s authorized representative to cure any alleged breach of this Agreement by Licensee. Licensee’s failure to cure the alleged breach within five (5) business days shall result in Licensee’s default of its obligations, its breach of this Agreement, and at Producer's sole discretion, the termination of Licensee’s rights hereunder. b. If Licensee engages in the commercial exploitation and/or sale of the Beat or New Song outside of the manner and amount expressly provided for in this Agreement, Licensee shall be liable to Producer for monetary damages in an amount equal to any and all monies paid, collected by, or received by Licensee, or any third party on its behalf, in connection with such unauthorized commercial exploitation of the Beat and/or New Song. c. Licensee recognizes and agrees that a breach or threatened breach of this Agreement by Licensee give rise to irreparable injury to Producer, which may not be adequately compensated by damages. Accordingly, in the event of a breach or threatened breach by the Licensee of the provisions of this Agreement, Producer may seek and shall be entitled to a temporary restraining order and a preliminary injunction restraining the Licensee from violating the provisions of this Agreement. Nothing herein shall prohibit Producer from pursuing any other available legal or equitable remedy from such breach or threatened breach, including but not limited to the recovery of damages from the Licensee. The Licensee shall be responsible for all costs, expenses or damages that Producer incurs as a result of any violation by the Licensee of any provision of this Agreement. Licensee’ obligation shall include court costs, litigation expenses, and reasonable attorneys' fees.

  • No Improper Practices (i) Neither the Company nor, to the Company’s knowledge, the Subsidiaries, nor to the Company’s knowledge, any of their respective executive officers has, in the past five years, made any unlawful contributions to any candidate for any political office (or failed fully to disclose any contribution in violation of law) or made any contribution or other payment to any official of, or candidate for, any federal, state, municipal, or foreign office or other person charged with similar public or quasi-public duty in violation of any law or of the character required to be disclosed in the Prospectus; (ii) no relationship, direct or indirect, exists between or among the Company or, to the Company’s knowledge, the Subsidiaries or any affiliate of any of them, on the one hand, and the directors, officers and stockholders of the Company or, to the Company’s knowledge, the Subsidiaries, on the other hand, that is required by the Securities Act to be described in the Registration Statement and the Prospectus that is not so described; (iii) no relationship, direct or indirect, exists between or among the Company or the Subsidiaries or any affiliate of them, on the one hand, and the directors, officers, stockholders or directors of the Company or, to the Company’s knowledge, the Subsidiaries, on the other hand, that is required by the rules of FINRA to be described in the Registration Statement and the Prospectus that is not so described; (iv) there are no material outstanding loans or advances or material guarantees of indebtedness by the Company or, to the Company’s knowledge, the Subsidiaries to or for the benefit of any of their respective officers or directors or any of the members of the families of any of them; and (v) the Company has not offered, or caused any placement agent to offer, Common Stock to any person with the intent to influence unlawfully (A) a customer or supplier of the Company or the Subsidiaries to alter the customer’s or supplier’s level or type of business with the Company or the Subsidiaries or (B) a trade journalist or publication to write or publish favorable information about the Company or the Subsidiaries or any of their respective products or services, and, (vi) neither the Company nor the Subsidiaries nor, to the Company’s knowledge, any employee or agent of the Company or the Subsidiaries has made any payment of funds of the Company or the Subsidiaries or received or retained any funds in violation of any law, rule or regulation (including, without limitation, the Foreign Corrupt Practices Act of 1977), which payment, receipt or retention of funds is of a character required to be disclosed in the Registration Statement or the Prospectus.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.