Inappropriate Access Sample Clauses

Inappropriate Access. It is never acceptable for you to look at confidential or patient information “just out of curiosity,” even if no harm is intended. • It does not matter whether the information pertains to a celebrity, political figure, or other “high profile” person, fellow workforce member, a close friend, family member, or yourself. You must protect and keep private ALL patient information, no matter whose it is. Just because you have access to a system or network or patient records, does not mean you have the right or authorization to access or view confidential or patient information that does not pertain to your job. All patient information is confidential and must be protected at all times. • Unauthorized access to networks or systems containing PHI or other confidential information includes: o Access without authorization. o Using someone else’s password and/or user ID. o Letting someone else log you into the network using their password. o Giving someone your password to log into the network. o Using your password to log someone else into the network. o Accessing information without a job-related “need-to-know.” • You are responsible and will be held accountable for all access to networks or systems using your password. • Be wise and only access systems and data as authorized.
AutoNDA by SimpleDocs
Inappropriate Access. I will not access or obtain my own, a friend’s, or a family member’s information maintained by Presence Health without appropriate written authorization and consistent with Presence Health Policies.
Inappropriate Access. Access to the information is granted on the basis that the partner organisations employee has a legitimate reason to access information only as set out above. Access and sharing of information are restricted and any unauthorised access or sharing may be challenged and reported to the partner organisations. The Partner organisations employees access privileges could also be deactivated, during any investigation.

Related to Inappropriate Access

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Receiving Party Personnel The receiving Party will limit access to the Confidential Information of the disclosing Party to those of its employees, attorneys and contractors that have a need to know such information in order for the receiving Party to exercise or perform its rights and obligations under this Agreement (the “Receiving Party Personnel”). The Receiving Party Personnel who have access to any Confidential Information of the disclosing Party will be made aware of the confidentiality provision of this Agreement, and will be required to abide by the terms thereof. Any third party contractors that are given access to Confidential Information of a disclosing Party pursuant to the terms hereof shall be required to sign a written agreement pursuant to which such Receiving Party Personnel agree to be bound by the provisions of this Agreement, which written agreement will expressly state that it is enforceable against such Receiving Party Personnel by the disclosing Party.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Employee Access Employees are entitled to read and review their personnel file and, without limiting the generality of the foregoing, shall be entitled to inspect their performance evaluations, written censures, letters of reprimand, and other adverse reports. Upon request, employees shall be given copies of all such pertinent documents. The Employer further agrees that no personal files or documents on employees shall be kept outside of the personnel file, apart from payroll or health services files.

  • Third Party Information I understand, in addition, that the Company has received and in the future will receive from third parties confidential or proprietary information (“Third Party Information”) subject to a duty on the Company’s part to maintain the confidentiality of such information and to use it only for certain limited purposes. During the term of my employment and thereafter, I will hold Third Party Information in the strictest confidence and will not disclose to anyone (other than Company personnel who need to know such information in connection with their work for the Company) or use, except in connection with my work for the Company, Third Party Information unless expressly authorized by an officer of the Company in writing.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code. (b) Unless and until the Bank receives such written notice of disclosure, the Account Holder shall be fully liable and be bound by all transactions effected by the use of such TBS, with or without his consent or knowledge.

  • Disclosure of Account Information to Third Parties We will disclose information to third parties about your account or the transfers you make:

  • DESIGNATED PERSONNEL The Contractor will provide the Designated Personnel listed below for the duration of the Contract at no charge to the State. Information regarding the Designated Personnel is set forth in Appendix D – Contractor and Reseller Information. Contractor must notify OGS within five (5) business days if any of the Designated Personnel change, and provide an interim contact person until the position is filled. Contractor may submit a Designated Personnel change by submission electronically via e-mail of a revised Appendix D – Contractor and Reseller Information to the OGS Contract Administrator. The Designated Personnel must have the authority to act on behalf of the Contractor: Account Manager The Account Manager is responsible for the overall relationship with the State during the course of the Contract and shall act as the central point of contact. Contract Administrator The Contract Administrator is responsible for the updating and management of the Contract on a timely basis. Sales Manager The Sales Manager is responsible for the overall relationship with the Authorized Users for matters relating to RFQs.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • Inside Information Each of the Finance Parties acknowledges that some or all of the Confidential Information is or may be price-sensitive information and that the use of such information may be regulated or prohibited by applicable legislation including securities law relating to insider dealing and market abuse and each of the Finance Parties undertakes not to use any Confidential Information for any unlawful purpose.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!