Discovery and Notification of Breach Sample Clauses

Discovery and Notification of Breach. Contractor shall notify County immediately by telephone call and email upon the discovery of a breach (or suspected breach) of privacy or security of PHI, PI, and/or PII in electronic, paper, spoken or in any other media, if the PHI, PI, and/or PII was not securely transmitted, or is reasonably believed to have been, accessed, acquired by an unauthorized person, or upon the discovery of a suspected privacy or security incident that involves data provided to County by the Social Security Administration or involving County PHI, PI, and/or PII; or by email within twenty- four (24) hours of the discovery of any suspected security incident, intrusion, or unauthorized use or disclosure of PHI, PI, and/or PII in violation of this agreement or the Business Associate Agreement, or potential loss of confidential data affecting this agreement. A breach shall be treated as discovered by Contractor as of the first day on which the breach is known, or by exercising reasonable diligence, would have been known, to any person (other than the person committing the breach) who is an employee, officer, or other agent of Contractor. Notification shall be provided to the KernBHRS Contract Manager, the KernBHRS Privacy & Corporate Office, and the KernBHRS Information Security Officer. If the incident occurs after business hours or on a weekend or holiday and involves electronic PHI, PI, and/or PII, notification shall be provided by calling the KernBHRS Information Security Officer at (000) 000-0000. Alternately, contact the KernBHRS Information Technology Services Division (ITSD) Help Desk at 000-000-0000. Upon discovery of a breach or suspected security incident, intrusion or unauthorized access, use, or disclosure of PHI, PI, and/or PII, Contractor shall take:
AutoNDA by SimpleDocs
Discovery and Notification of Breach a. Business Associate shall implement reasonable systems, policies, and procedures for discovery of possible HIPAA violations and breaches (as defined below), and shall ensure that its workplace members and other agents are adequately trained and aware of the importance of timely reporting of possible breaches.
Discovery and Notification of Breach. The District shall notify COUNTY immediately by telephone call plus email or fax upon the discovery of breach (or suspected breach) of security of PHI, PI and/or PII in electronic media or in any other media, if the PHI, PI and/or PII was, or is reasonably believed to have been, a c c e s s e d , acquired by an unauthorized person, or upon the discovery of a suspected security incident that involves data provided to COUNTY by the Social Security Administration or involving COUNTY PHI, PI and/or PII; or within twenty-four (24) hours by email or fax of the discovery of any suspected security incident, intrusion or unauthorized use or disclosure of PHI, PI and/or PII in violation of this agreement or the Business Associate Agreement, or potential loss of confidential data affecting this agreement. A breach shall be treated as discovered by District as of the first day on which the breach is known, or by exercising reasonable diligence, would have been known, to any person (other than the person committing the breach) who is an employee, officer or other agent of District.
Discovery and Notification of Breach. The Contractor shall notify the State immediately by telephone call, plus e-mail or fax, upon the discovery of breach of security of Personal Information, Sensitive Information, or Confidential Information (PSCI) in computerized form if the PSCI was, or is reasonably believed to have been, acquired by an unauthorized person, or within one

Related to Discovery and Notification of Breach

  • PREVENTION OF BRIBERY 30.1 The Supplier represents and warrants that neither it, nor to the best of its knowledge any Supplier's Personnel, have at any time prior to the Commencement Date:

  • Corrective Action and Notice If Customer becomes aware of any actual or threatened activity prohibited by Section 3.3, Customer shall, and shall cause its Authorized Users to, immediately: (a) take all reasonable and lawful measures within their respective control that are necessary to stop the activity or threatened activity and to mitigate its effects (including, where applicable, by discontinuing and preventing any unauthorized access to the Services and Provider Materials and permanently erasing from their systems and destroying any data to which any of them have gained unauthorized access); and (b) notify Provider of any such actual or threatened activity.

Time is Money Join Law Insider Premium to draft better contracts faster.