Inappropriate Access Sample Clauses
The Inappropriate Access clause defines restrictions and consequences related to unauthorized or improper access to certain systems, data, or resources. Typically, this clause outlines what constitutes inappropriate access, such as accessing confidential information without permission or bypassing security protocols, and may specify disciplinary actions or liability for violations. Its core function is to protect sensitive information and systems by deterring unauthorized use and providing a clear basis for addressing breaches.
Inappropriate Access. I will not access or obtain my own, a friend’s, or a family member’s information maintained by Presence Health without appropriate written authorization and consistent with Presence Health Policies.
Inappropriate Access. It is never acceptable for you to look at confidential or patient information “just out of curiosity,” even if no harm is intended. • It does not matter whether the information pertains to a celebrity, political figure, or other “high profile” person, fellow workforce member, a close friend, family member, or yourself. You must protect and keep private ALL patient information, no matter whose it is. Just because you have access to a system or network or patient records, does not mean you have the right or authorization to access or view confidential or patient information that does not pertain to your job. All patient information is confidential and must be protected at all times. • Unauthorized access to networks or systems containing PHI or other confidential information includes: o Access without authorization. o Using someone else’s password and/or user ID. o Letting someone else log you into the network using their password. o Giving someone your password to log into the network. o Using your password to log someone else into the network. o Accessing information without a job-related “need-to-know.” • You are responsible and will be held accountable for all access to networks or systems using your password. • Be wise and only access systems and data as authorized.
Inappropriate Access. Access to the information is granted on the basis that the partner organisations employee has a legitimate reason to access information only as set out above. Access and sharing of information are restricted and any unauthorised access or sharing may be challenged and reported to the partner organisations. The Partner organisations employees access privileges could also be deactivated, during any investigation.
