Incident and Breach Reporting Policies and Procedures Sample Clauses

Incident and Breach Reporting Policies and Procedures. QHPI agrees to report any Breach of PII to the CMS IT Service Desk by telephone at (000) 000-0000 or 0-000-000-0000 or via email notification at xxx_xx_xxxxxxx_xxxx@xxx.xxx.xxx within 24 hours from knowledge of the Breach. Incidents must be reported to the CMS IT Service Desk by the same means as Breaches within 72 hours from knowledge of the Incident. In the event of an Incident or Breach QHPI must permit CMS to gather all information necessary to conduct all Incident response activities deemed necessary by CMS. If QHPI fails to report an Incident or Breach in compliance with this provision, the QHPI may be subject to the Termination provision (Section V) of this Agreement. Termination pursuant to Section V may also result where an Incident or Breach is found to have resulted from 1 While CMS owns FFE data, other contractors operate the FFE system in which the enrollment and financial management data flow. Contractors provide the pipeline network for the transmission of electronic data, including the transport of Exchange data to and from the Hub and QHPI so that QHPI may discern the activity related to enrollment functions of persons they serve. QHPI may also use the transported data to receive descriptions of financial transactions from CMS. QHPI’s failure to comply with the terms of this Agreement. Nothing in this Agreement should be construed to limit the ability of HHS to temporarily suspend the ability of a QHPI to connect to HHS systems due to suspected or confirmed security risks and Incidents or Breaches.
AutoNDA by SimpleDocs
Incident and Breach Reporting Policies and Procedures. QHPI agrees to report any Breach of PII to the CMS IT Service Desk by telephone at (000) 000-0000 or 0-000-000-0000 or via email notification at 1 Contractors provide the pipeline network for the transmission of electronic data, including the transport of Exchange data to and from the Hub and QHPI so that QHPI may discern the activity related to enrollment functions of persons they serve. QHPI may also use the transported data to receive descriptions of financial transactions from CMS. xxx_xx_xxxxxxx_xxxx@xxx.xxx.xxx within 24 hours from knowledge of the Breach. Incidents must be reported to the CMS IT Service Desk by the same means as Breaches within 72 hours from knowledge of the Incident. In the event of an Incident or Breach QHPI must permit CMS to gather all information necessary to conduct all Incident response activities deemed necessary by CMS. If QHPI fails to report an Incident or Breach in compliance with this provision, the QHPI may be subject to the Termination provision (Section V) of this Agreement. Termination pursuant to Section V may also result where an Incident or Breach is found to have resulted from QHPI’s failure to comply with the terms of this Agreement. Nothing in this Agreement should be construed to limit the ability of HHS to temporarily suspend the ability of a QHPI to connect to HHS systems due to suspected or confirmed security risks and Incidents or Breaches.

Related to Incident and Breach Reporting Policies and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls:

  • Reporting Procedures Enter in the XXX Entity Management area the information that XXX requires about each proceeding described in paragraph 2 of this award term and condition. You do not need to submit the information a second time under assistance awards that you received if you already provided the information through XXX because you were required to do so under Federal procurement contracts that you were awarded.

  • Research Use Reporting To assure adherence to NIH GDS Policy, the PI agrees to provide annual Progress Updates as part of the annual Project Renewal or Project Close-out processes, prior to the expiration of the one (1) year data access period. The PI who is seeking Renewal or Close-out of a project agree to complete the appropriate online forms and provide specific information such as how the data have been used, including publications or presentations that resulted from the use of the requested dataset(s), a summary of any plans for future research use (if the PI is seeking renewal), any violations of the terms of access described within this Agreement and the implemented remediation, and information on any downstream intellectual property generated from the data. The PI also may include general comments regarding suggestions for improving the data access process in general. Information provided in the progress updates helps NIH evaluate program activities and may be considered by the NIH GDS governance committees as part of NIH’s effort to provide ongoing stewardship of data sharing activities subject to the NIH GDS Policy.

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse.

  • General Reporting Requirements The MA-PD Sponsor agrees to submit to information to CMS according to 42 CFR §§423.505(f), 423.514, and the "Final Medicare Part D Reporting Requirements," a document issued by CMS and subject to modification each program year.

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Human and Financial Resources to Implement Safeguards Requirements 6. The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

Time is Money Join Law Insider Premium to draft better contracts faster.