Information Safeguards. Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.
Information Safeguards. Business Associate will use appropriate safeguards to preserve the integrity and confidentiality of, and to prevent intentional or unintentional non-permitted use or disclosure of Covered Entity’s Protected Health Information, including in compliance with 45 C.F.R. § 164.530(c) and any other implementing regulation issued by the United States Department of Health and Human Services (“DHHS”).
Information Safeguards. Business Associate will develop, document, implement, maintain, and use appropriate administrative, technical, and physical safeguards, in compliance with Social Security Act § 1173(d) (42 U.S.C. § 1320d-2(d)), 45 C.F.R. Part 164, Subparts C & E, and any other implementing regulations issued by the U.S. Department of Health and Human Services (including, but not limited to, CMS Core Security Requirements, if applicable), and any other applicable laws. The safeguards will be designed to preserve the integrity, availability and confidentiality of electronic PHI, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, PHI. Business Associate will additionally develop any safeguards to the extent required by the HITECH Act. Business Associate will document and keep these safeguards current. Business Associate agrees to mitigate any harmful effect that is known to the Business Associate resulting from a use or disclosure of PHI or electronic PHI by the Business Associate or its subcontractors in violation of the requirements of this Agreement.
Information Safeguards. Business Associate shall develop, implement, maintain, and use appropriate administrative, technical, and physical safeguards, in compliance with HIPAA, HITECH, and any other implementing regulations issued by the United States Department of Health and Human Services. The safeguards shall be designed to preserve the integrity and confidentiality of, and to prevent any nonpermitted or violating use or disclosure of, Protected Health Information. Business Associate shall keep the safeguards current.
Information Safeguards. Broker shall develop, implement, maintain and use appropriate administrative, technical and physical safeguards, in compliance with applicable state and federal laws, to preserve the confidentiality of and to prevent unauthorized disclosures of Health Information or Personal and Health Information collected, created or received for or from the Company. Broker shall document and keep such safeguards current and, upon the Company’s reasonable request, shall provide the Company with a copy of policies and procedures related to such safeguards.
Information Safeguards. (i) Privacy of the Covered Entity’s Protected Health Information. The Business Associate will develop, implement, maintain, and use appropriate administrative, technical, and physical safeguards to protect the privacy of the Covered Entity’s Protected Health Information. The safeguards must reasonably protect the Covered Entity’s Protected Health Information from any intentional or unintentional use or disclosure in violation of the Privacy Rule and limit incidental uses or disclosures made to a use or disclosure otherwise permitted by this Agreement.
Information Safeguards. Associate will maintain appropriate administrative, technical and physical safeguards to prevent use or disclosure of PHI not permitted by this Addendum. Associate will also maintain administrative, technical and physical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of electronic PHI in compliance with the Privacy and Security Rule.
Information Safeguards. BMFN maintains physical, electronic and procedural safeguards to guard your nonpublic personal information. As a result, only authorized employees who need to know your information in order to provide you with products or services will have access to your nonpublic personal information. We restrict the access of authorized employees to nonpublic personal information for business purposes only. These safeguards are used by all BMFN affiliates.
Information Safeguards. Vendor will use appropriate administrative, technical and physical safeguards to prevent the use or disclosure of PHI (except for uses or disclosures provided for by this Addendum). Vendor will maintain administrative, technical and physical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of electronic PHI, consistent with the requirements applicable to Covered Entities under the Privacy and Security Rules.
Information Safeguards. Each Party shall (to the extent it has the ability to access Confidential Information of the other Party) maintain administrative, technical and physical safeguards that are reasonably designed to (a) protect the security and confidentiality of such Confidential Information; (b) protect against any anticipated threats or hazards to the security or integrity of such Confidential Information; (c) protect against use or destruction of such Confidential Information that could result in substantial harm to the Confidential Information and which are no less protective of Confidential Information than how the Party protects its own Confidential Information; and (d) properly dispose of such Confidential Information, in each case not less than in accordance with the standards required by Applicable Law.