Increased Privacy Protections Sample Clauses

Increased Privacy Protections. In the event that Covered Entity honors a request to restrict the use or disclosure of PHI pursuant to 45 C.F.R. §164.522, Covered Entity will notify Business Associate in writing of any restriction to the extent any such restriction may limit Business Associate’s ability to use and/or disclose PHI as permitted or required under this BAA or impose obligations on Business Associate additional to or inconsistent with the obligations assumed hereunder. However, should such revisions materially increase Business Associate’s cost of providing services under this BAA, Covered Entity shall reimburse Business Associate for such increase in cost.
AutoNDA by SimpleDocs
Increased Privacy Protections. In the event that Covered Entity honors a request to restrict the use or disclosure of PHI pursuant to 45 C.F.R. §164.522, Covered Entity will notify Business Associate of any restriction to the extent any such restriction may limit Business Associate’s ability to use and/or disclose PHI as permitted or required under this BAA or impose obligations on Business Associated additional to or inconsistent with the obligations assumed under this BAA.

Related to Increased Privacy Protections

  • Privacy Protection Each of the Corporation and the Subsidiaries have security measures and safeguards in place to protect personal information it collects from registered patients and customers and other parties from illegal or unauthorized access or use by its personnel or third parties or access or use by its personnel or third parties in a manner that violates the privacy rights of third parties. The Corporation and the Subsidiaries have complied, in all material respects, with all applicable privacy and consumer protection legislation and neither has collected, received, stored, disclosed, transferred, used, misused or permitted unauthorized access to any information protected by privacy laws, whether collected directly or from third parties, in an unlawful manner. The Corporation and the Subsidiaries have taken all reasonable steps to protect personal information against loss or theft and against unauthorized access, copying, use, modification, disclosure or other misuse.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Frequency Protection Should Company install any type of radio transceiver or other wireless communications equipment, Company will provide frequency protection within the aviation air/ground VHF frequency band and the UHF frequency band in accordance with restrictions promulgated by the Federal Aviation Administration (FAA) for the vicinity of FAA Transmitter or Receiver facilities. Frequency protection will also be provided for all other frequency bands operating in the vicinity of Company’s equipment. Should interference occur as a result of Company’s installation, Authority reserves the right to shut down Company’s installation until appropriate remedies to the interference are made by Company. Such remedies may include relocation to another site. The cost of all such efforts to remedy the interference will be solely at Company’s expense.

  • Applicability of Data Privacy Protections In the event that Personal Information will be Processed by Supplier in connection with the performance under this Agreement (including any SOW), then and only then shall the provisions of this Section ‘Data Protection and Privacy’ be applicable. For the avoidance of doubt, the data security requirements contained in section ‘Information Security’ shall apply regardless of whether Personal Information is Processed under this Agreement or any SOW. All Personal Information obtained from or on behalf of DXC or in connection with performance pursuant to this Agreement shall be Processed and protected pursuant to this Section ‘Data Protection and Privacy’, the Section ‘Information Security’ and any other Sections of this Agreement that address Personal Information.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • DATA PROTECTION AND PRIVACY 14.1 In addition to Supplier’s obligations under Sections 6, 9, 10, and 15, Supplier will comply with this Section 14 when processing Accenture Personal Data. "

  • Salary Protection A regular employee who fills a regular vacancy or displaces a regular employee at a lower classification shall receive salary protection in accordance with Article 27.7.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

  • Access to Protected Health Information 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524.

  • Export and Privacy Red Hat may supply Client with technical data that is subject to export control restrictions. Red Hat will not be responsible for compliance by Client with applicable export obligations or requirements for this technical data. Client agrees to comply with all applicable export control restrictions. If Client breaches this Section 13.6 or the export provisions of an applicable end user license agreement for the Software, or any provision referencing these sections, Red Hat may terminate this Agreement and/or the applicable Order Form and its obligations thereunder without liability to Client. Client acknowledges and agrees that to provide the Services, it may be necessary for Client Information to be transferred between Red Hat, its Affiliates, Business Partners and/or subcontractors, which may be located worldwide.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!