We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Examples of Breaches Sample Clauses

Examples of Breaches. NOTE: These are examples only. They do not include all possible breaches of privacy, confidentiality or security covered by this agreement. Staff should read and understand relevant Barwon Health policies and procedures. These are listed with this agreement and can be accessed via the Barwon Health Intranet.
Examples of Breaches. NOTE: These are examples only. They do not include all possible breaches of privacy, confidentiality or security covered by this agreement. Staff should read and understand relevant EGHS policies and procedures. Accessing information that you do not need to know to do your job: • Reading of a client’s medical record or an employee file without authorisation. • Searching of Patient Master Index for familiar names. • Accessing information on family, friends, co-workers or yourself. • Reading pathology/radiology results of family, friends, co-workers or yourself. Divulging personal information without individual’s consent: • Discussing or “gossiping” about client details in situations unrelated to direct patient care. • Conducting a conversation relating to client or staff information in a public place. • Telling a relative or friend about a client or patient you have seen. • Discussing confidential information in a public area such as a waiting room, elevator or cafeteria. • Divulging information via electronic means – e.g. social media, text Sharing, copying or changing information without proper authorisation: • Making unauthorised changes to a client’s medical record. • Making unauthorised changes to an employee file. • Copying and forwarding client or staff information to a third party without having verbal or written consent. Sharing your password: • Telling a co-worker your password so that they can access your work. • Telling an unauthorised person the access codes for employee files or client accounts. • Using unauthorised shared passwords. Using another person’s password: • Using a co-worker’s password to log in to the Hospital’s computer system. • Use of a password to access employee files or client accounts without authorisation. • Using a co-worker’s application for which you do not have rights after he/she is logged in. Disclosing client information without following EGHS guidelines: • Faxing without including a fax cover sheet. • Disclosing unauthorised client details over the phone. • Emailing sensitive papers and information Leaving a secure information system (i.e. System that is password protected) unattended while logged on: • Being away from your desk (e.g. tea or lunch breaks) while you are logged into a secure system. • Allowing a co-worker to use a secure system for which he/she does not have access after you have logged in.  PATIENTS / CLIENTS / RESIDENTS AND / OR THEIR FAMILY MEMBERS - such as medical records, conversations and fina...
Examples of Breaches. 2.1. Accessing information that you do not need to know to do your role: • Unauthorised reading of a client’s record or an employee file. • Accessing families, friends, or colleagues’ personal information. 2.2. Divulging private and confidential information without the individual’s consent: • Discussing or gossiping about client details in situations unrelated to role. • Conducting a conversation relating to client or worker information in a public place. • Disclosing client or worker information via any form of social media. Privacy and Confidentiality Agreement | Page 1 of 2 Doc No: Form 19 Version No: 02 Version Date: 17/08/2023 2.3. Sharing, copying, or changing information without proper authorisation: • Making unauthorised changes to a client’s medical record. • Making unauthorised changes to a worker’s file. • Copying and forwarding client or worker information to a third party without having verbal or written consent.
Examples of Breaches. NOTE: These are examples only. They do not include all possible breaches of privacy, confidentiality or security covered by this agreement. Staff should read and understand relevant EGHS policies and procedures.
Examples of Breaches to the NZTC expectations of student conduct include, but are not limited to, conduct unbecoming of a teacher, plagiarism, cheating including the submission of work that has been completed entirely or partially by another person or by artificial intelligence, falsifying of documents, theft of NZTC property including intellectual property, or any criminal offence.
Examples of Breaches. The following are examples of breaches:

Related to Examples of Breaches

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • Waiver of Breach The waiver by either party of the breach of any provision of this Agreement shall not operate or be construed as a waiver of any subsequent breach by either party.