Common use of Data Transmissions Clause in Contracts

Data Transmissions. In connection with any transfer of Personal Information or PHI between them in the operation of the Interface, each Party: (i) will transfer such Personal Information or PHI only through use of a dedicated connection to which they are the only authorized parties or such other method of communication, such as encrypted communication, between them as offers an equivalent level of security and authentication of the recipient; (ii) will not permit any third party to use any such connection to the extent that such use is within that Party’s control, except as permitted herein; and (iii) will take adequate and reasonable steps to ensure that access to that Personal Information and PHI at each facility that Party has or on each system utilized by such Party or its subcontractors is limited to authorized personnel of that Party. Each Party will take reasonable care to ensure that data transmissions between them in the operation of the Interface that contain any Personal Information or PHI are timely, complete, and accurate, and each Party will take reasonable steps to retransmit any such data transmission to the other Party upon discovery that the original transmission has been lost in transmission or is corrupted. If either Party receives data from the other and is informed or believes that such data was not intended for it, the receiving Party will notify the sender, promptly take effective steps to return such data, or at the direction of the other Party immediately and permanently delete such data from its systems.

Appears in 3 contracts

Samples: Partner Agreement, Partner Agreement, Partner Agreement

AutoNDA by SimpleDocs

Data Transmissions. In connection with any transfer of Personal Information or PHI between them in the operation of the Interface, each Party: (i) will transfer such Personal Information or PHI only through use of a dedicated connection to which they are the only authorized parties or such other method of communication, such as encrypted communication, between them as offers an equivalent level of security and authentication of the recipient; (ii) will not permit any third party to use any such connection to the extent that such use is within that Party’s control, except as permitted herein; and (iii) will take adequate and reasonable steps to ensure that access to that Personal Information and PHI at each facility that Party has or on each system utilized by such Party or its subcontractors is limited to authorized personnel of that Party. Each Party will take reasonable care to ensure that data transmissions between them in the operation of the Interface that contain any Personal Information or PHI are timely, complete, and accurate, and each Party will take reasonable steps to retransmit any such data transmission to the other Party upon discovery that the original transmission has been lost in transmission or is corrupted. If either Party receives data from the other and is informed or believes that such data was not intended for it, the receiving Partner Agreement (web).2017.v3 Party will notify the sender, promptly take effective steps to return such data, or at the direction of the other Party immediately and permanently delete such data from its systems.

Appears in 2 contracts

Samples: Partner Agreement, Partner Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.