Contents of Notification. We will need: (A) Your name and Account number; (B) A description of the error or the transfer about which you are; (C) An explanation as you to why you believe the transaction in question is an error or why you need more information; and (D) The dollar amount and date of the suspected error.
Contents of Notification. The notification required by this Section 15) (Security Breach Notification) shall include sufficient information for NC HIEA and notified Participants to understand the nature and the extent of the Security Breach. For instance, such notification should include, to the extent available at the time of the notification the following information:
i) A brief description of what happened, including the date of the Security Breach and the date of discovery of the Security Breach, if known;
ii) The identification of each Individual whose HIE Data has been, or is reasonably believed to have been, accessed, acquired, used, or Disclosed during the Security Breach;
iii) Description of the roles of the people involved in the Security Breach (e.g., employees, Authorized Users, service providers, unauthorized persons, etc.);
iv) Description of the types of HIE Data that were involved in the Security Breach (whether full name, Social Security number, date of birth, home address, account number, diagnosis, disability code; or other types of information were involved);
v) Description of Participants likely impacted by the Security Breach;
vi) Number of Individuals or records impacted or estimated to be impacted by the Security Breach;
vii) Description of actions taken to investigate the Security Breach, to mitigate risks or actual harm to Individuals, and to protect against any further Breach;
viii) Current status of the Security Breach (under investigation or resolved);
ix) Contact procedures for Individuals to ask questions or to learn additional information, which shall include a toll-free telephone number, an e-mail address, Web site, or postal address; and
x) Corrective action taken and steps planned to be taken to prevent a similar Security Breach.
Contents of Notification. Any notice referenced above in Section V(A) of this BAA will include, to the extent known to the Business Associate, the identification of each individual whose Unsecured PHI has been, or is reasonably believed by Business Associate to have been accessed, acquired, used, or disclosed during such Breach. Business Associate will also provide to Covered Entity other available information that the Covered Entity is required to include in its notification to the individual pursuant to the Breach Notification Rule.
Contents of Notification. The Breach notification provided to Covered Entity shall include, to the extent possible:
a. the identification of each Individual whose Unsecured Protected Health Information has been, or is reasonably believed by Business Associate to have been, accessed, acquired, Used, or Disclosed during the Breach;
b. a brief description of what happened, including the date of the Breach and the date of discovery of the Breach, if known;
c. a description of the types of Unsecured Protected Health Information that were involved in the Breach (such as whether full name, Social Security number, date of birth, home address, account number, diagnosis, disability code, or other types of information were involved);
d. any steps Individuals should take to protect themselves from potential harm resulting from the Breach;
e. a brief description of what Business Associate is doing to investigate the Breach, to mitigate harm to Individuals, and to protect against any further Breach; and
f. contact procedures for Individuals to ask questions or learn additional information, which shall include a toll-free telephone number, an e-mail address, Web site, or postal address. Do Not Sign Business Associate shall provide the information specified in this Section to Covered Entity at the time of the Breach notification, if possible, or promptly thereafter as information becomes available. Business Associate shall not delay notification to Covered Entity that a Breach has occurred in order to collect the information described in this Section, and shall provide such information to Covered Entity even if the information becomes available after the thirty (30) day period provided in Section 5.1, above.
Contents of Notification. In its notification made to the IESO pursuant to Section 7.1, the Recipient must, as applicable:
(a) identify the reason for the Default;
(b) identify the reason for the Remote Project not being completed or being delayed;
Contents of Notification. In its notification made to the IESO pursuant to Section 7.1, the Recipient must, as applicable:
(a) identify the deficient parts of its FIT Application or LRP Proposal and explain why the FIT Application or LRP Proposal was rejected;
(b) identify the reason for the Default or termination of the FIT Contract or the LRP Contract;
(c) explain how the rejection of the FIT Application or the LRP Proposal, or the characterization of the Identified Transmission Project as not being viable, will impact the viability of the Project or the Project Partnership;
(d) explain how the Force Majeure will impact the viability of the Project or the Project Partnership;
(e) identify the reason given by the Governmental Authority for the Identified Transmission Project no longer being viable or the relevant application to become a Transmitter being rejected; and
(f) explain whether and how the Recipient intends to rectify the events set out in its notification made to the IESO pursuant to Section 7.1.
Contents of Notification. T h e n o t ifi- c a t io n r efe rr ed t o i n p a r a g r a p h ( a) of t h i s sec t io n s h a ll i n cl u de:
(1) T h e ide n t i t y of t h e Cu s t o m s office a n d office r iss u i n g t h e n o t ific a t io n;
(2) T h e n a m e of t h e Ca n a di a n o r Mexic a n expo r t e r o r p r od u ce r of t h e good, o r p r od u ce r of t h e m a t e r i a l , x x xxx p r e m i ses a r e t o be visi t ed;
(3) T h e d a t e a n d pl a ce of t h e p r oposed ve r ific a t io n visi t ;
(4) T h e objec t a n d scope of t h e p r o- posed ve r ific a t io n visi t , i n xx x xx x x spe- cific r efe r e n ce t o t h e good o r m a t e r i a l t h a t i s t h e s u bjec t of t h e ve r ific a t io n;
Contents of Notification. The Operator shall on giving any notification pursuant to Clause 4.1 (except in relation to Clause 4.2.4) give the information referred to in Clause 3.1.3 and in every case referred to in Clause 4.2 :-
4.3.1 refer to any previous notice given to such person in respect of such Operations;
4.3.2 identify where the current notice differs from the last such notice;
4.3.3 indicate whether, in its opinion, the consent of the person to whom the notice is given is required pursuant to Clause 4.4.
Contents of Notification. Each Notification of intent to participate in this project must contain the following information:
Contents of Notification. The notification required by this Section 11 shall include sufficient information for CCNC and notified Participants to understand the nature and the extent of the Breach. For instance, such notification should include, to the extent available at the time of the notification the following information:
i. A brief description of what happened, including the date of the Breach and the date of discovery of the Breach, if known;
ii. The identification of each Individual whose Patient Information has been, or is reasonably believed to have been, accessed, acquired, used, or Disclosed during the Breach;
iii. Description of the roles of the people involved in the Breach (e.g., employees, Authorized Users, service providers, unauthorized persons, etc.);
iv. Description of the types of Patient Information that were involved in the Breach (whether full name, Social Security number, date of birth, home address, account number, diagnosis, disability code, or other types of information were involved);
v. Description of Participants likely impacted by the Breach;
vi. Number of Individuals or records impacted/estimated to be impacted by the Breach;
vii. Description of actions taken to investigate the Breach, to mitigate harm to Individuals, and to protect against any further Breach;
viii. Current status of the Breach (under investigation or resolved);
ix. Contact procedures for Individuals to ask questions or learn additional information, which shall include a toll-free telephone number, an e-mail address, Web site, or postal address; and
x. Corrective action taken and steps planned to be taken to prevent a similar Breach.